Infosecurity News Features

  1. September's M&A News Roundup

    September 2022 was another busy moth for M&A in the cybersecurity industry

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  2. #NITAM: Preventing the Recruitment of Insider Threat Actors

    Organizations must take action to mitigate the risk of employees being recruited on behalf of cyber threat actors

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  3. NSO Group's Recent Difficulties Could Shape the Future of the Spyware Industry

    With a 111% surge in spyware use in the last year, many experts call for global regulations

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  4. Alleged TikTok Breach Could Expose Two Billion Data Records

    The Chinese social media firm claims “that the code in question is completely unrelated to TikTok’s backend source code”

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  5. Five Ways to Achieve a Successful Anti-Phishing Campaign

    Infosecurity Magazine has selected five key takeaways for a successful anti-phishing campaign from security awareness firm CybSafe’s new ebook

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  6. August’s M&A News Roundup

    August saw a number of high profile M&A updates in cybersecurity, including discussions about the acquisition of Darktrace

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  7. Hack Backs: A Legitimate Tactic or Counter-Productive?

    Following DDoS attacks on ransomware gang LockBit, experts discuss the issues around hacking back against cyber-criminals

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  8. TryHackMe: The Story Behind the UK’s Most Innovative Cyber SME

    Cybersecurity training platform TryHackMe's co-founder describes the company's journey so far

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  9. Estonia's Battle Against a Deluge of DDoS Attacks

    The European nation has seen a spike in DDoS attacks throughout August

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  10. Analysis: Darktrace’s Potential Takeover

    What are the potential implications if the acquisition of Darktrace by Thoma Bravo goes through?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  11. Interview: Coleen Shane - a Diverse Perspective

    Coleen Shane tells Eleanor Dallaway about her experiences as a trans woman working in cybersecurity

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  12. Digital Security by Design: A Government Strategy That Can’t Afford to Fail

    James Coker investigates the UK government-backed Digital Security by Design (DSbD) initiative

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  13. #MentalHealthAwarenessWeek: Supporting Cyber Workers' Mental Health More Crucial Than Ever

    The burden placed on cyber workers is becoming unmanageable, and organizations must act now

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  14. #WorldPasswordDay: 6 Ways Organizations Can Strengthen Employees' Password Practices

    There are various methods organizations can use to improve their employees' password practices

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  15. Roundtable: Experts Discuss Current Cyber Threat Trends and Challenges

    Policy makers and other industry stakeholders discuss the current cyber-threat landscape

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  16. BT and Toshiba Launch Groundbreaking Quantum Communication Service

    The network’s first customer, EY, will utilize the network to connect two of its sites in London

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  17. Analyzing the Surprising Data from The State of Ransomware 2022 Report with Chet Wisniewski

    Eleanor Dallaway and Chet Wisniewski dig deep into the more surprising results of The State of Ransomware 2022 Report

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  18. Will Elon Musk’s Twitter Takeover Have Cybersecurity Implications?

    Musk's ambitions to tackle bots on Twitter and make the site's algorithm open source have prompted debate

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  19. Tackling Online Disinformation: The Free Speech Dilemma

    Tackling misinformation while preserving the fundamental right to freedom of expression is becoming a growing challenge

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  20. #WorldBackupDay: 5 Backup Tips to Retain Critical Data Following a Ransomware Attack

    Backups are increasingly vital amid evoling ransomware techniques

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

What’s Hot on Infosecurity Magazine?