Infosecurity News Features

Detect, Protect and Survive

Detect, Protect and Survive

Incident response has become one of those areas of cybersecurity that people think they could do better, but how often do they test it and how well could they actually act in the event of an incident occurring?

Help Save the Youth of Cyber

Help Save the Youth of Cyber

The news over the weekend was full of stories about how the youth of the UK was going to be taught cyber skills.

Password Managers - Resolution to Authentication Headaches

Password Managers - Resolution to Authentication Headaches

“Password managers are a good thing” as they give “huge advantages in a world where there's far too many passwords for anyone to remember”

Identifying the Problem of Disruption

Identifying the Problem of Disruption

Why do so many disruptions occur outside of the organization’s network control and why are they hard to monitor and identify?

All At Sea

All At Sea

Cables run between continents, channelling terabits of information down a single fibre-optic link. They are incredibly expensive to build, with a transatlantic link costing around $500 million, and only a handful of firms have the ability to lay them.

#WIREDSecurity: The Best Bits

#WIREDSecurity: The Best Bits

WIRED Magazine recently held it's first WIRED Security Conference in London. Here are our highlights from the day

CREST Workshop Gathers to Tackle Gender Gap in InfoSec

CREST Workshop Gathers to Tackle Gender Gap in InfoSec

It’s no secret that women have been overwhelmingly underrepresented in the cybersecurity industry for a number of years

#Oktane16: Journalist Brian Krebs on Cyber-attacks, Authentication and Authorization

#Oktane16: Journalist Brian Krebs on Cyber-attacks, Authentication and Authorization

Renowned investigative journalist Brian Krebs took to the stage this week at Oktane16 to discuss all things cybersecurity

Almost a Third of Staff Still Fall for Phishing Emails

Almost a Third of Staff Still Fall for Phishing Emails

Research from Duo Security's Duo Insight phishing tool found 31% of staff clicked the link in emails sent by their internal team

How to be a Successful Next-Gen CISO: A Panel Discussion – Part Two

How to be a Successful Next-Gen CISO: A Panel Discussion – Part Two

At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

How to be a Successful Next-Gen CISO: A Panel Discussion – Part One

How to be a Successful Next-Gen CISO: A Panel Discussion – Part One

At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

We’re Vulnerable to Attack, Say 89% of UK Organizations

We’re Vulnerable to Attack, Say 89% of UK Organizations

Companies planning to invest in security in the next 12 months are running the risk of doing so in the wrong areas, says Vormetric.

What’s Hot on Infosecurity Magazine?