Infosecurity News Features

  1. Cybersecurity M&A: Proofpoint Finalizes Tessian Acquisition, Palo Alto Buys Israeli Firm

    Thoma Bravo-owned Proofpoint closed the acquisition of British cloud email security vendor Tessian at the end of October

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  2. #CyberMonth: Is MFA Enough to Protect You Against Cyber-Attacks?

    One of CISA’s Cybersecurity Awareness Month mottos is “Turn on multi-factor authentication”. Is this enough to prevent phishing attacks?

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  3. What You Need to Know About the New SEC Requirements

    Publicly listed firms that trade in the US must move quickly to ensure they comply with new SEC rules on cybersecurity incident disclosure

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  4. Cybersecurity M&A Roundup: Cisco Breaks Record, Thoma Bravo Buys Again

    Cisco announced its latest cybersecurity acquisition in September in a deal worth $28bn

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  5. AI Safety Summit Faces Criticisms for Narrow Focus

    Cybersecurity experts and privacy advocates criticized the UK government for focusing the summit on ‘Frontier AI’ risks only

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  6. A Guide to Zero-Day Vulnerabilities and Exploits for the Uninitiated

    Infosecurity takes a deep dive into what lies behind the term zero day, from the vulnerability to the attack exploiting it

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  7. Four Ways to Become a More Efficient CISO From Gartner Analysts

    CISOs must boost effectiveness and efficiency to meet growing challenges, according to Gartner analysts

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  8. Top Five Things You Need to Know to Protect Against Insider Threats

    Insider threats present a very different risk than external cyber-attacks, and these differences must be understood to address this growing challenge

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  9. FBI's QakBot Takedown Raises Questions: 'Dismantled' or Just a Temporary Setback?

    Has the FBI really dismantled QakBot, cybercriminals’ favorite malware loader? Many experts doubt it

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  10. Five ICS Security Challenges and How to Overcome Them

    ICS operators face distinct cybersecurity challenges compared to standard IT environments

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  11. NIST's Cybersecurity Framework 2.0: Shaping the Future of Cyber Resilience

    A new draft version of the NIST framework has significant changes, including a new pillar that looks to cover governance

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  12. Black Hat USA Unwrapped: Top 5 Cybersecurity Insights You Can't Afford to Miss

    Infosecurity reviews five highlights from Black Hat USA 2023 that inform us on the current cybersecurity trends

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

What’s hot on Infosecurity Magazine?