News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Sean Michael Kerner
Sean Michael Kerner
Reporter,
Infosecurity Magazine
#DEFCON: Electrovolt Exploits Against Electron Desktop Apps Exposed
News
16 August 2022
#DEFCON: How US Teen RickRolled His High School District
News
16 August 2022
#DEFCON: How Sanctions Impact Internet Operators
News
15 August 2022
#DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation
News
15 August 2022
#BHUSA: Bug Bounty Botox – Why You Need a Security Process First
News
12 August 2022
#BHUSA: Failure to Challenge is a Social Engineering Risk
News
12 August 2022
#BHUSA: What has Changed in the Post-Stuxnet Era?
News
12 August 2022
#BHUSA: The Cyber Safety Review Board Outlines Log4j Lessons
News
11 August 2022
#BHUSA: Russia's Wiper Attacks Against Ukraine Detailed
News
11 August 2022
#BHUSA: Chris Krebs Explains How Cybersecurity Can Improve
News
11 August 2022
#RSAC: World Economic Forum Cybercrime Atlas Effort Advances
News
13 June 2022
#RSAC: The Cybersecurity Maturity Model Certification Program is Coming
News
13 June 2022
#RSAC: CISA Outlines Bad Practices Every Organization Should Avoid
News
10 June 2022
#RSAC: The Privacy and Blockchain Paradox
News
10 June 2022
#RSAC: "Users Are Not Stupid, So Don't Treat Them Like They Are"
News
10 June 2022
#RSAC: Plain Language Threat Modeling for DevSecOps
News
9 June 2022
#RSAC: NSA Outlines Threats from Russia, China and Ransomware
News
9 June 2022
#RSAC: Lessons Learned From the Solarwinds Sunburst Attack
News
9 June 2022
#RSAC: Funding Cyber Civil Defense to Help Improve the State of Security
News
9 June 2022
#RSAC: How to Fix IoT Security with Digital Twins
News
9 June 2022
#RSAC: The Most Dangerous Attacks of 2022
News
8 June 2022
#RSAC: How the US Government and Industry Work Together to Stop Cyber-Attacks
News
8 June 2022
#RSAC: Cryptographers Panel Outlines Perils of Adversarial AI and Blockchain
News
8 June 2022
#Enigma2022: Security's Role in Helping HealthTech Find Its Way
News
4 February 2022
#Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection
News
3 February 2022
#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information
News
2 February 2022
#SecTorCa: Cyber Expert Wendy Nather Unmasks "Scary Bits" of Infosec in 2021
News
5 November 2021
#SecTorCa: Jeff Moss Defines the Role of Hacking
News
3 November 2021
#DEFCON: Exploiting Vulnerabilities in the Global Food Supply Chain
News
8 August 2021
#DEFCON: Exploiting Physical Shopping Carts for Denial of Shopping
News
8 August 2021
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability
News
5 February 2026
1
Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
News
3 February 2026
2
Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover
News
4 February 2026
3
Smartphones Now Involved in Nearly Every Police Investigation
News
5 February 2026
4
AI Drives Doubling of Phishing Attacks in a Year
News
4 February 2026
5
SolarWinds Web Help Desk Vulnerability Actively Exploited
News
4 February 2026
6
NSA Publishes New Zero Trust Implementation Guidelines
News
2 February 2026
1
Cybersecurity M&A Roundup: CrowdStrike and Palo Alto Networks Lead Investment in AI Security
News Feature
2 February 2026
2
Data Privacy Day: Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever
News Feature
28 January 2026
3
Over 80% of Ethical Hackers Now Use AI
News
27 January 2026
4
New CISA Guidance Targets Insider Threat Risks
News
29 January 2026
5
Number of Cybersecurity Pros Surges 194% in Four Years
News
29 January 2026
6
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
15:00 —
16:00, 22 January 2026
1
Five Non-Negotiable Strategies to Get Identity Security Right in 2026
Webinar
18:00 —
18:30, 22 January 2026
2
How to Implement Attack Surface Management in the AI and Cloud Age
Webinar
15:00 —
16:00, 3 April 2025
3
Cyber Resilience in the AI Era: New Challenges and Opportunities
Webinar
15:00 —
16:00, 25 March 2025
4
Safeguarding Critical Supply Chain Data Through Effective Risk Assessment
Webinar
15:00 —
16:00, 10 April 2025
5
Dispelling the Myths of Defense-Grade Cybersecurity
Webinar
11:00 —
12:00, 4 December 2024
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6
Close