Infosecurity News Features

  1. Tackling the Cyber Skills Shortfall: A Multipronged Approach

    The cybersecurity industry is in the market for a lot of new talent. James Coker sets out to explore all of the ways it can find it, fast!

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  2. Top 4 Ways Organizations Can Stay Secure Amid Christmas Staff Shortages

    Organizations must plan for the absence of security personnel over Christmas

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  3. Top 10: Infosecurity Predictions for 2022

    Infosecurity sets out its top 10 security predictions for 2022 using insights from industry experts

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  4. Experts Discuss Proposed Changes to the UK’s Data Protection Regime

    Westminster eforum panel highlights the opportunities and challenges posed by potential changes to the UK's data protection regime

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  5. #FraudAwarenessWeek: Addressing Surging Business Fraud

    This year's International Fraud Awareness Week provides an opportunity to highlight surging business fraud

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  6. Is Application Isolation the Future of Endpoint Security?

    Phil Muncaster investigates what the technology has to offer for enterprise CISOs

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  7. #CyberMonth: How to Protect Yourself from Phishing Attacks

    Online users should follow this year's #CSAM mantra of 'Think Before U Click' to detect phishing attacks

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  8. Connected Devices: The Hidden Smart Home Endpoints Expanding the Corporate Attack Surface

    Amidst the scramble to secure remote working laptops, Phil Muncaster asks whether IT teams should focus their efforts more broadly

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  9. #NITAM: Mitigating Non-Malicious Insider Risk

    How can organizations reduce the risk of negligent insider threats?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  10. CREST Concludes Investigation and Responds to NCC Group Exam Leak Scandal

    After a year-long investigation, Phil Muncaster asks what lessons can be learned from the CREST exam leak scandal

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  11. Experts React to the UK's Planned Divergence from GDPR

    What could the UK's planned divergence from GDPR mean for businesses and individual privacy?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  12. #WomensEqualityDay: How to Increase Opportunities for Women in Tech

    Leading figures in cyber and tech offer their thoughts on how women can progress in this sector

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  13. Biometrics: Addressing Ethical and Legal Challenges

    Organizations should implement biometric technologies carefully, ensuring they don't fall foul of ethical and legal problems

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  14. Robert Hannigan: Cyber-Industry Needs to Get Back to Basics

    Speaking during last month's Infosecurity Europe virtual conference, Robert Hannigan explains that focusing on the basics is key to staying secure

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  15. The Looming Threat of Deepfakes

    Deepfakes are becoming more popular and more dangerous. Yet, detection technologies offer a vital countermeasure.

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  16. Why Endpoint Security Needs to Adapt to the New Distributed Workplace

    As the pandemic recedes, flexible working practices will remain. Phil Muncaster investigates the cybersecurity challenges this will create

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  17. Mitigating Cyber-Threats to High-Profile Events

    As high-profile events with spectators return, what cyber-risks should organizers be looking at in their preparations?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  18. The Cyber House Party Lets its Hair Down for Infosecurity Europe

    The Cyber House Party will be the official after-show event for next week's Infosecurity Europe virtual conference

  19. The Growing Role of Privileged Access Management in Keeping Organizations Secure

    Infosecurity Magazine explores how easy it can be to obtain login credentials and how to develop a privileged access management (PAM) strategy to mitigate this problem

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  20. #ScamsAwarenessFortnight - Adopting a Zero Trust Mindset to Tackle Fraud

    The dangerous growth in fraud since the pandemic means businesses must adopt an effective zero trust attitude

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?