News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Kimberly Crawley
Kimberly Crawley
Freelance Writer
Computer Scientists: Passwords Can be Acquired from Brain Waves
News
30 June 2017
CIA May Have Developed Linux Malware
News
30 June 2017
Linux Systemd Vulnerability Enables DNS Attacks
News
29 June 2017
Shadow Brokers Taunt and Blackmail NSA
News
29 June 2017
Ransomware Vaccine Now Available
News
28 June 2017
Deloitte: Oil and Gas Companies Poorly Prepared for Cyber-Attack
News
27 June 2017
GhostHook Attack Targets Windows 10 Vulnerability
News
26 June 2017
China Agrees to Cease Cyber-Attacks on Canadian Private Sector
News
26 June 2017
Ohio Governor John Kasich the Latest Target of Cyber-Attack
News
26 June 2017
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Skills Shortages Trump Headcount as Critical Cyber Challenge
News
4 December 2025
1
New GhostFrame Phishing Framework Hits Over One Million Attacks
News
4 December 2025
2
Yearn Finance yETH Pool Hit by $9M Exploit
News
3 December 2025
3
UK Ransomware Payment Ban to Come with Exemptions, Security Minster Say
News
3 December 2025
4
CISA and International Partners Issue Guidance for Secure AI in Infrastructure
News
4 December 2025
5
Cyber Agencies Push for Digital Trust Amid AI Era with New Provenance Report
News
4 December 2025
6
Australian Man Gets Seven Years for Running “Evil Twin” Wi-Fi
News
1 December 2025
1
#BHUSA: Microsoft and Google Among Most Affected as Zero Day Exploits Jump 46%
News
4 August 2025
2
Scattered Lapsus$ Hunters Take Aim At Zendesk Users
News
27 November 2025
3
Preparing for the Quantum Future: Lessons from Singapore
Blog
1 December 2025
4
French Football Federation Suffers Data Breach
News
28 November 2025
5
Gartner: 40% of Firms to Be Hit By Shadow AI Security Incidents
News
20 November 2025
6
Exposing AI’s Blind Spots: Security vs Safety in the Age of Gen AI
Webinar
12:30 —
13:30, 13 November 2025
1
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
2
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
3
Mastering Identity and Access for Non-Human Cloud Entities
Webinar
14:00 —
16:00, 18 September 2025
4
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
5
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
Webinar
15:00 —
16:00, 17 July 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6