Infosecurity News Features

Russia-Ukraine: New Norms in Cyber Warfare Emerging
Defence and cybersecurity analysts consider the cybersecurity implications the conflict and why cyber-Armageddon has not yet been realized

The US Government’s Open Source Security Policy Discussed
Camille Stewart Gloster and Anjana Rajan from the ONCD discuss how the federal government plans to help enhance security in open source software

Next-Gen: How A Security Researcher Turned EDRs Into Wipers Using 0-Day Exploits
Or Yair, a SafeBreach security researcher, developed a proof of concept to create a next-gen wiper using EDR tools to wipe files

January's M&A News Roundup
Cybersecurity buyers and sellers remained cagey regarding January’s deals

#DataPrivacyWeek: Addressing ChatGPT's Shortfalls in Data Protection Law Compliance
OpenAI needs to better address whether its language model ChatGPT is compliant with data protection regulations across the world, experts say

#DataPrivacyWeek: ChatGPT's Data-Scraping Model Under Scrutiny From Privacy Experts
OpenAI’s latest large language model raises significant privacy issues that need to be addressed, experts say

#DataPrivacyWeek: How to Respond to Changing Consumer Data Privacy Expectations
Infosecurity speaks to leading experts about how organizations should adapt their privacy strategies to changing consumer expectations

MFA Bypass: The Next Frontline for Security Pros
MFA has long been recommended by governments and industry bodies, but cyber-criminals are searching for ways to turn this security strength into a weakness

The LastPass Breaches: Password Managers in the Spotlight
What do the recent LastPass breaches mean for the use of password managers in the future

Top 10: The Biggest Cybersecurity Deals of 2022
In 2022, the 10 most lucrative cybersecurity deals happened in the US

December's M&A News Roundup
Although December saw a few significant deals in the cybersecurity industry, buyers and sellers remained cagey regarding the money involved

Lessons Learned: The Log4J Vulnerability 12 Months On
Infosecurity spoke to cybersecurity professionals about the state of the Log4j vulnerability 12 months since it was made public

Top Cybersecurity Lessons from 2022 for Security Teams – Part 2
Part 2 of Infosecurity's list of the top cybersecurity lessons organizations should take from 2022

Top Cybersecurity Lessons from 2022 for Security Teams – Part 1
Infosecurity provides the first part of its list of the top cybersecurity lessons security teams should take from 2022

Data Reform Bill: Experts Criticize the UK's GDPR Replacement
The UK government aims to remove GDPR red tape, but the proposed bill has been heavily criticized by some experts

Locked Shields: Preparing for Cyber Warfare
Against a backdrop of war in Europe, NATO’s annual ‘Locked Shields’ cyber exercise took on extra importance in 2022

Tackling the Scourge of Malicious Streaming Sites During this Year’s FIFA World Cup
Cyber-criminals are using the lure of streaming World Cup matches to steal data and install malware

November’s M&A News Roundup
November saw several notable M&A deals announced, including those involving Intel471, Orange Cyberdefense and Palo Alto Networks

How to Maintain Strong Cybersecurity in the Face of Economic Headwinds
Cybersecurity professionals share their advice on how to maintain strong cybersecurity against economic pressures

Fighting Disinformation with Technology: Three Blueprints for a More Trustable Internet
As social media platforms are failing to tackle the spread of misinformation and disinformation, some are turning to emerging technologies to build a more trustable internet







