News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
John Walker
John Walker
Visiting Professor at the School of Science & Technology - Nottingham Trent University
Better Late Than Never
Blog
27 November 2015
Happy Halloween - Putting the Genie Back Into the Bottle
Blog
30 October 2015
The Titan Pain of Dim Sum
Blog
23 October 2015
Sheep vs Cyber-Insurance
Blog
19 October 2015
Experian: It’s Our Data So We Must Demand MORE
Blog
12 October 2015
Only Consultant Surgeons Need Apply
Blog
2 October 2015
Keeping It Classy When It Comes To Data Security
Blog
9 September 2015
Cyber Threat Intelligence – No Longer Just a Nice To Have
Blog
24 August 2015
Cybersecurity in the Modern Age – Get with the 2020 Program
Blog
14 August 2015
Ransomware: How to Avoid Extortion
Webinar
15:00 —
16:00, 27 August 2015
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Motors WordPress Vulnerability Exposes Sites to Takeover
News
17 December 2025
1
Phishing Messages and Social Scams Flood Users Ahead of Christmas
News
16 December 2025
2
Grok-4 Jailbroken Two Days After Release Using Combined Attack
News
14 July 2025
3
Denmark Blames Russia for "Destructive" Cyber-Attacks
News
19 December 2025
4
US Charges 54 in Massive ATM Jackpotting Conspiracy
News
19 December 2025
5
From The Few to the Many: How ‘PAM For All’ Strengthens Security
Opinion
19 December 2025
6
New BeaverTail Malware Variant Linked to Lazarus Group
News
18 December 2025
1
Critical PickleScan Vulnerabilities Expose AI Model Supply Chains
News
2 December 2025
2
Helldown Ransomware Expands to Target VMware and Linux Systems
News
19 November 2024
3
Urban VPN Proxy Accused of Harvesting AI Chat Conversations
News
16 December 2025
4
OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365
News
18 December 2025
5
Phishing Messages and Social Scams Flood Users Ahead of Christmas
News
16 December 2025
6
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
1
Exposing AI’s Blind Spots: Security vs Safety in the Age of Gen AI
Webinar
12:30 —
13:30, 13 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
Webinar
15:00 —
16:00, 17 July 2025
4
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
5
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6