Infosecurity News Features

CREST Workshop Gathers to Tackle Gender Gap in InfoSec

CREST Workshop Gathers to Tackle Gender Gap in InfoSec

It’s no secret that women have been overwhelmingly underrepresented in the cybersecurity industry for a number of years

#Oktane16: Journalist Brian Krebs on Cyber-attacks, Authentication and Authorization

#Oktane16: Journalist Brian Krebs on Cyber-attacks, Authentication and Authorization

Renowned investigative journalist Brian Krebs took to the stage this week at Oktane16 to discuss all things cybersecurity

Almost a Third of Staff Still Fall for Phishing Emails

Almost a Third of Staff Still Fall for Phishing Emails

Research from Duo Security's Duo Insight phishing tool found 31% of staff clicked the link in emails sent by their internal team

How to be a Successful Next-Gen CISO: A Panel Discussion – Part Two

How to be a Successful Next-Gen CISO: A Panel Discussion – Part Two

At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

How to be a Successful Next-Gen CISO: A Panel Discussion – Part One

How to be a Successful Next-Gen CISO: A Panel Discussion – Part One

At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.

We’re Vulnerable to Attack, Say 89% of UK Organizations

We’re Vulnerable to Attack, Say 89% of UK Organizations

Companies planning to invest in security in the next 12 months are running the risk of doing so in the wrong areas, says Vormetric.

Harsh Lessons Learned by Linkedin

Harsh Lessons Learned by Linkedin

A 2012 breach of LinkedIn user data was believed to have contained “close to 6.5 million unsalted password hashes” and for this writer, it taught me a lot about salting and hashing as LinkedIn raced to fix the issue.

Human Error Considered Biggest Security Threat to Orgs, New Study Finds

Human Error Considered Biggest Security Threat to Orgs, New Study Finds

NODE4's study examines the attitudes and precautions adopted by ITDMs regarding the cyber threat landscape.

Microsoft Using Machine Learning to Strengthen Security

Microsoft Using Machine Learning to Strengthen Security

Microsoft has released the newest version of its Security Intelligence Report which analyzes the threat landscape of exploits and vulnerabilities the industry faced in the second half of 2015.

Techniques of Cyber-Criminals Continue to Evolve

Techniques of Cyber-Criminals Continue to Evolve

New report reveals that cyber-criminals have adopted an organizational shift in how they carry out their attacks.

San Bernardino Case May be Over, but Gov Access Issue Will Not Go Away

San Bernardino Case May be Over, but Gov Access Issue Will Not Go Away

The US government has found its own way into the iPhone of San Bernardino gunmen Syed Farook, dropping 'backdoor' demand

Will the £35K Rule Hit the Security Industry?

Will the £35K Rule Hit the Security Industry?

As of 6 April 2016, skilled workers in the UK on Tier 2 visas (sponsored 'work permits') will only be able to secure Indefinite Leave to Remain in the UK if they are earning at least £35,000 per year.

What’s Hot on Infosecurity Magazine?