Infosecurity News Features

Now Microsoft says get off old IE versions, as it's pulling the plug on support

Now Microsoft says get off old IE versions, as it's pulling the plug on support

Microsoft will end support for all older versions of Internet Explorer from Tuesday 12th January. How will this impact businesses?

Security Headlines Present Little Christmas Cheer

Security Headlines Present Little Christmas Cheer

A look back at the headlines over the Christmas period, in the best and worst instances of information security.

GDPR Passes the Security Test

GDPR Passes the Security Test

The EU Parliament and Council have agreed on a text for the long-awaited General Data Protection Regulation, and it has been greeted with positive appraisal from security experts.

Six Months Later, Find Out If The OPM Breach Affected You

Six Months Later, Find Out If The OPM Breach Affected You

News appeared last week that more than a million American victims of the Office of Personnel Management (OPM) hack had not been notified that they were involved.

Keeping Software Defined Datacenters Secure

Keeping Software Defined Datacenters Secure

Anyone who has been paying attention to current thought around datacenter design will be aware of the increasing trend towards a software defined datacenter (SDDC). But in the same way that cloud was, initially at least, seen as insecure, does running an SDDC mean that an organization is more at risk?

Predictions for 2016

Predictions for 2016

2015 - what a year it was. But what will the coming twelve months likely bring for the security industry?

UK General Election 2015: What the Major Parties Promise on Security

UK General Election 2015: What the Major Parties Promise on Security

With just a week to go until polling day, Infosecurity takes a look at what the major contenders in the UK’s general election pledge on cybersecurity and technology

Webinar Report: Anti-Encryption Comments from Authorities Branded Unrealistic by Security Experts

Webinar Report: Anti-Encryption Comments from Authorities Branded Unrealistic by Security Experts

Business implications of banning encryption make the idea absurd, panelists argue

Ten Years of White Hat Ball: The Difference a Decade Makes

Ten Years of White Hat Ball: The Difference a Decade Makes

As the White Hat Ball prepares to celebrate its tenth anniversary, Eleanor Dallaway takes a look back at the highlights and successes from the past ten years, and learns what a difference a decade can make

2015 Industry Predictions Part 3: Defense, Response, Collaboration

2015 Industry Predictions Part 3: Defense, Response, Collaboration

In the final part of Infosecurity's 2015 forecast, industry officials prophesy developments in the field of threat response and detection

2015 Industry Predictions Part 2: The Escalating Threats

2015 Industry Predictions Part 2: The Escalating Threats

Infosecurity's predictions series continues as industry insiders deliver their thoughts on the developing threat landscape

2015 Industry Predictions Part 1: The Recurring Themes

2015 Industry Predictions Part 1: The Recurring Themes

The infosec industry looks ahead to 2015, beginning with the continued persistence of known threats

What’s Hot on Infosecurity Magazine?