Infosecurity News Features

  1. Top CISO Successes

    CISOs and cybersecurity professionals highlight the biggest successes the cyber industry is experiencing today

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  2. Top CISO Challenges

    Nine CISOs and cybersecurity professionals share some of the biggest challenges they face

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  3. Top 10 Cyber-Attacks of 2023

    Infosecurity sets out the top 10 most damaging cyber-attacks that emerged in 2023

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  4. One Year of ChatGPT: The Impact of Generative AI on Cybersecurity

    Cybersecurity experts discuss how LLM tools like OpenAI’s ChatGPT have changed the cyber-threat landscape

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  5. Cybersecurity M&A: Proofpoint Finalizes Tessian Acquisition, Palo Alto Buys Israeli Firm

    Thoma Bravo-owned Proofpoint closed the acquisition of British cloud email security vendor Tessian at the end of October

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  6. #CyberMonth: Is MFA Enough to Protect You Against Cyber-Attacks?

    One of CISA’s Cybersecurity Awareness Month mottos is “Turn on multi-factor authentication”. Is this enough to prevent phishing attacks?

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  7. What You Need to Know About the New SEC Requirements

    Publicly listed firms that trade in the US must move quickly to ensure they comply with new SEC rules on cybersecurity incident disclosure

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  8. Cybersecurity M&A Roundup: Cisco Breaks Record, Thoma Bravo Buys Again

    Cisco announced its latest cybersecurity acquisition in September in a deal worth $28bn

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  9. AI Safety Summit Faces Criticisms for Narrow Focus

    Cybersecurity experts and privacy advocates criticized the UK government for focusing the summit on ‘Frontier AI’ risks only

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  10. A Guide to Zero-Day Vulnerabilities and Exploits for the Uninitiated

    Infosecurity takes a deep dive into what lies behind the term zero day, from the vulnerability to the attack exploiting it

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  11. Four Ways to Become a More Efficient CISO From Gartner Analysts

    CISOs must boost effectiveness and efficiency to meet growing challenges, according to Gartner analysts

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  12. Top Five Things You Need to Know to Protect Against Insider Threats

    Insider threats present a very different risk than external cyber-attacks, and these differences must be understood to address this growing challenge

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  13. FBI's QakBot Takedown Raises Questions: 'Dismantled' or Just a Temporary Setback?

    Has the FBI really dismantled QakBot, cybercriminals’ favorite malware loader? Many experts doubt it

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  14. Five ICS Security Challenges and How to Overcome Them

    ICS operators face distinct cybersecurity challenges compared to standard IT environments

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  15. NIST's Cybersecurity Framework 2.0: Shaping the Future of Cyber Resilience

    A new draft version of the NIST framework has significant changes, including a new pillar that looks to cover governance

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  16. Black Hat USA Unwrapped: Top 5 Cybersecurity Insights You Can't Afford to Miss

    Infosecurity reviews five highlights from Black Hat USA 2023 that inform us on the current cybersecurity trends

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  17. Unraveling the EC Data Breach: Cybersecurity Experts Weigh In on the Implications

    The cybersecurity experts react to the UK Electoral Commission breach, which unveils a curious timeline of threats and data exposure

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  18. What the OWASP Top 10 for LLMs Means for the Future of AI Security

    The OWASP foundation set the first industry standard for identifying and mitigating security risks in LLMs

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  19. Why French Defense Giant Thales is Betting Big on Cybersecurity

    Thales has dropped $3.6 billion on a deal to acquire Imperva and expand its cybersecurity offering into application security

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  20. How to Mitigate the Impact of Cyber Staff Absences During the Summer Break

    Four additional steps organizations can take to limit the extra vulnerabilities caused by increased fluctuations in security staff during the summer

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?