News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Ken Munro
Ken Munro
Partner, Pen Test Partners
Security by Obscurity: The Flip-Side of the Compliance Coin
Webinar
15:00 —
16:00, 30 May 2019
Super Systemic IoT Issues
Opinion
6 March 2019
EU Cybersecurity Certification: a Missed Opportunity
Blog
5 September 2018
Review: "Industrial Cyber Security for Dummies"
Review
30 November 2017
IoT Regulation: One Rule to Bind Them All vs Mission Impossible
Magazine Feature
28 November 2017
Gone in Less Than 60 Seconds: Why the Automotive Industry Needs to Get up to Speed with Security
Opinion
17 June 2016
Cutting Through the Hyperbole: What the IoT Really Means for Enterprise Cyber Security
Webinar
15:00 —
16:00, 28 March 2016
Are Keyless Car Manufacturers Clueless About Disclosure?
Opinion
26 August 2015
How Deniability is Covering Up Security Weaknesses
Opinion
27 May 2015
Browsers, Certificates and Trust: What's Changing and What You Need to Know
Webinar
15:00 —
16:00, 2 April 2015
Shellshock: the Exploits behind the Headlines
Webinar
15:00 —
16:00, 9 October 2014
Developing a Holistic Approach to Patch Management
Webinar
15:00 —
16:00, 13 November 2014
Know your enemy: inside a perimeter-based attack
Webinar
15:00 —
16:00, 19 June 2014
Advanced Cyber Attacks: Identifying The Culprits
Webinar
15:00 —
16:00, 5 September 2013
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Urban VPN Proxy Accused of Harvesting AI Chat Conversations
News
16 December 2025
1
Motors WordPress Vulnerability Exposes Sites to Takeover
News
17 December 2025
2
Denmark Blames Russia for "Destructive" Cyber-Attacks
News
19 December 2025
3
FBI Disrupts Russian Crypto Laundering Hub Enabling Cybercrime
News
19 December 2025
4
OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365
News
18 December 2025
5
Millions of Car Owners Hit By Credit700 Data Breach
News
16 December 2025
6
Critical PickleScan Vulnerabilities Expose AI Model Supply Chains
News
2 December 2025
1
Helldown Ransomware Expands to Target VMware and Linux Systems
News
19 November 2024
2
Urban VPN Proxy Accused of Harvesting AI Chat Conversations
News
16 December 2025
3
Asahi to Launch Cybersecurity Overhaul After Crippling Cyber-Attack
News
15 December 2025
4
New BeaverTail Malware Variant Linked to Lazarus Group
News
18 December 2025
5
Phishing Messages and Social Scams Flood Users Ahead of Christmas
News
16 December 2025
6
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
1
Exposing AI’s Blind Spots: Security vs Safety in the Age of Gen AI
Webinar
12:30 —
13:30, 13 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
Webinar
15:00 —
16:00, 17 July 2025
4
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
5
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6