Infosecurity News Features

  1. Rationalizing Security Awareness Training

    Security awareness training (SAT) is at the top of many security companies' lists for hardening defenses. Human error is a leading cause of data breaches, so it makes sense to teach employees how to avoid key mistakes.

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  2. Security by Design: Learning from the Past to Reimagine the Future

    The DSbD initiative aims to revolutionize cybersecurity in the UK

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  3. Inside Man Series Four: Analyzing KnowBe4's Novel Approach to Security Awareness Training

    Series four of Inside Man premiered last week, providing more entertainment alongside cybersecurity lessons

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  4. As Nation-State and Cybercrime Threats Conflate, Should CISOs Be Worried?

    Phil Muncaster discovers that the lines between government campaigns and organized crime are increasingly blurred.

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  5. #SaferInternetDay: Tackling Online Abuse and Cyber-Bullying

    How can users take back control of the internet from the trolls?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  6. Kaspersky Research Sparks Free Speech Debate

    The display of new research about people's digital footprints provoked free speech concerns

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  7. Reviewing the UK's New Cybersecurity Strategy

    Does the UK's new cybersecurity strategy go far enough to protect the public sector?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  8. Bad Clicks and Fallible Users: How Organizations Can Mitigate Insider Risks

    No amount of user training can completely eradicate the risks posed by phishing. Phil Muncaster finds out what organizations can do about it

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  9. #DataPrivacyWeek: Prioritize Data Protection to Safeguard Consumer Privacy

    Organizations must re-evaluate their data protection strategies during this year's Data Privacy Week

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  10. Tackling the Cyber Skills Shortfall: A Multipronged Approach

    The cybersecurity industry is in the market for a lot of new talent. James Coker sets out to explore all of the ways it can find it, fast!

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  11. Top 4 Ways Organizations Can Stay Secure Amid Christmas Staff Shortages

    Organizations must plan for the absence of security personnel over Christmas

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  12. Top 10: Infosecurity Predictions for 2022

    Infosecurity sets out its top 10 security predictions for 2022 using insights from industry experts

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  13. Experts Discuss Proposed Changes to the UK’s Data Protection Regime

    Westminster eforum panel highlights the opportunities and challenges posed by potential changes to the UK's data protection regime

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  14. #FraudAwarenessWeek: Addressing Surging Business Fraud

    This year's International Fraud Awareness Week provides an opportunity to highlight surging business fraud

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  15. Is Application Isolation the Future of Endpoint Security?

    Phil Muncaster investigates what the technology has to offer for enterprise CISOs

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  16. #CyberMonth: How to Protect Yourself from Phishing Attacks

    Online users should follow this year's #CSAM mantra of 'Think Before U Click' to detect phishing attacks

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  17. Connected Devices: The Hidden Smart Home Endpoints Expanding the Corporate Attack Surface

    Amidst the scramble to secure remote working laptops, Phil Muncaster asks whether IT teams should focus their efforts more broadly

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  18. #NITAM: Mitigating Non-Malicious Insider Risk

    How can organizations reduce the risk of negligent insider threats?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  19. CREST Concludes Investigation and Responds to NCC Group Exam Leak Scandal

    After a year-long investigation, Phil Muncaster asks what lessons can be learned from the CREST exam leak scandal

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  20. Experts React to the UK's Planned Divergence from GDPR

    What could the UK's planned divergence from GDPR mean for businesses and individual privacy?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?