Infosecurity News Features

  1. Hack Backs: A Legitimate Tactic or Counter-Productive?

    Following DDoS attacks on ransomware gang LockBit, experts discuss the issues around hacking back against cyber-criminals

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  2. TryHackMe: The Story Behind the UK’s Most Innovative Cyber SME

    Cybersecurity training platform TryHackMe's co-founder describes the company's journey so far

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  3. Estonia's Battle Against a Deluge of DDoS Attacks

    The European nation has seen a spike in DDoS attacks throughout August

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  4. Analysis: Darktrace’s Potential Takeover

    What are the potential implications if the acquisition of Darktrace by Thoma Bravo goes through?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  5. Interview: Coleen Shane - a Diverse Perspective

    Coleen Shane tells Eleanor Dallaway about her experiences as a trans woman working in cybersecurity

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  6. Digital Security by Design: A Government Strategy That Can’t Afford to Fail

    James Coker investigates the UK government-backed Digital Security by Design (DSbD) initiative

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  7. #MentalHealthAwarenessWeek: Supporting Cyber Workers' Mental Health More Crucial Than Ever

    The burden placed on cyber workers is becoming unmanageable, and organizations must act now

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  8. #WorldPasswordDay: 6 Ways Organizations Can Strengthen Employees' Password Practices

    There are various methods organizations can use to improve their employees' password practices

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  9. Roundtable: Experts Discuss Current Cyber Threat Trends and Challenges

    Policy makers and other industry stakeholders discuss the current cyber-threat landscape

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  10. BT and Toshiba Launch Groundbreaking Quantum Communication Service

    The network’s first customer, EY, will utilize the network to connect two of its sites in London

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  11. Analyzing the Surprising Data from The State of Ransomware 2022 Report with Chet Wisniewski

    Eleanor Dallaway and Chet Wisniewski dig deep into the more surprising results of The State of Ransomware 2022 Report

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  12. Will Elon Musk’s Twitter Takeover Have Cybersecurity Implications?

    Musk's ambitions to tackle bots on Twitter and make the site's algorithm open source have prompted debate

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  13. Tackling Online Disinformation: The Free Speech Dilemma

    Tackling misinformation while preserving the fundamental right to freedom of expression is becoming a growing challenge

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  14. #WorldBackupDay: 5 Backup Tips to Retain Critical Data Following a Ransomware Attack

    Backups are increasingly vital amid evoling ransomware techniques

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  15. Top 10: Cybersecurity Lessons CISOs Should Take from the Russia-Ukraine Conflict

    The report warns the Russia-Ukraine conflict has permanently altered the cyber-threat landscape

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  16. The Zero Trust Journey: How to Mitigate Cyber-Risk in the Post-Pandemic Era

    Phil Muncaster asks how endpoint security can bolster multi-year zero trust projects

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  17. #IWD2022: Supporting Women and Campaigning for an Equal Future

    A range of figures in the cybersecurity industry discuss strategies to achieve gender equality in the sector

  18. Rationalizing Security Awareness Training

    Security awareness training (SAT) is at the top of many security companies' lists for hardening defenses. Human error is a leading cause of data breaches, so it makes sense to teach employees how to avoid key mistakes.

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  19. Security by Design: Learning from the Past to Reimagine the Future

    The DSbD initiative aims to revolutionize cybersecurity in the UK

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  20. Inside Man Series Four: Analyzing KnowBe4's Novel Approach to Security Awareness Training

    Series four of Inside Man premiered last week, providing more entertainment alongside cybersecurity lessons

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?