News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Sean Michael Kerner
Sean Michael Kerner
Reporter,
Infosecurity Magazine
#DEFCON: Electrovolt Exploits Against Electron Desktop Apps Exposed
News
16 August 2022
#DEFCON: How US Teen RickRolled His High School District
News
16 August 2022
#DEFCON: How Sanctions Impact Internet Operators
News
15 August 2022
#DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation
News
15 August 2022
#BHUSA: Bug Bounty Botox – Why You Need a Security Process First
News
12 August 2022
#BHUSA: Failure to Challenge is a Social Engineering Risk
News
12 August 2022
#BHUSA: What has Changed in the Post-Stuxnet Era?
News
12 August 2022
#BHUSA: The Cyber Safety Review Board Outlines Log4j Lessons
News
11 August 2022
#BHUSA: Russia's Wiper Attacks Against Ukraine Detailed
News
11 August 2022
#BHUSA: Chris Krebs Explains How Cybersecurity Can Improve
News
11 August 2022
#RSAC: World Economic Forum Cybercrime Atlas Effort Advances
News
13 June 2022
#RSAC: The Cybersecurity Maturity Model Certification Program is Coming
News
13 June 2022
#RSAC: CISA Outlines Bad Practices Every Organization Should Avoid
News
10 June 2022
#RSAC: The Privacy and Blockchain Paradox
News
10 June 2022
#RSAC: "Users Are Not Stupid, So Don't Treat Them Like They Are"
News
10 June 2022
#RSAC: Plain Language Threat Modeling for DevSecOps
News
10 June 2022
#RSAC: NSA Outlines Threats from Russia, China and Ransomware
News
9 June 2022
#RSAC: Lessons Learned From the Solarwinds Sunburst Attack
News
9 June 2022
#RSAC: Funding Cyber Civil Defense to Help Improve the State of Security
News
9 June 2022
#RSAC: How to Fix IoT Security with Digital Twins
News
9 June 2022
#RSAC: The Most Dangerous Attacks of 2022
News
8 June 2022
#RSAC: How the US Government and Industry Work Together to Stop Cyber-Attacks
News
8 June 2022
#RSAC: Cryptographers Panel Outlines Perils of Adversarial AI and Blockchain
News
8 June 2022
#Enigma2022: Security's Role in Helping HealthTech Find Its Way
News
4 February 2022
#Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection
News
3 February 2022
#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information
News
2 February 2022
#SecTorCa: Cyber Expert Wendy Nather Unmasks "Scary Bits" of Infosec in 2021
News
5 November 2021
#SecTorCa: Jeff Moss Defines the Role of Hacking
News
3 November 2021
#DEFCON: Exploiting Vulnerabilities in the Global Food Supply Chain
News
8 August 2021
#DEFCON: Exploiting Physical Shopping Carts for Denial of Shopping
News
8 August 2021
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers
News
15 May 2026
1
Bank of England, FCA and Treasury Raise Alarm Over Frontier AI
News
18 May 2026
2
China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer
News
15 May 2026
3
Canvas Owner Reaches Agreement With Cybercriminals After Ransomware Attack
News
13 May 2026
4
Avada Builder Flaws Expose One Million WordPress Sites
News
13 May 2026
5
Interpol Launches Sweeping Cybercrime Crackdown in MENA Region
News
18 May 2026
6
Interview: How Alpine’s Head of IT Secures the High-Speed Environment of an F1 Team
Interview
14 May 2026
1
ShinyHunters Escalates Canvas Extortion with School by School Ransom Campaign
News
11 May 2026
2
What Fronter AI Models Like Mythos and GPT-Cyber Mean for Modern Cybersecurity
News Feature
15 May 2026
3
Google Launches Android Spyware Forensics Tool for High-Risk Users
News
14 May 2026
4
ICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks
News
14 May 2026
5
OpenAI Launches 'Daybreak' to Help Build Secure By Design Software
News
12 May 2026
6
Financial Services Under Pressure: Supply Chain Risk, Regulation and Operational Resilience
Webinar
15:00 —
16:00, 30 April 2026
1
Behind the Curtain of Microsoft 365 Cybersecurity: Lessons from Overlooked Resilience Gaps
Webinar
15:00 —
16:00, 23 April 2026
2
Why Resilience‑Focused Cloud Design Is Your Best Defense Against Modern Attacks
Webinar
18:00 —
19:00, 9 April 2026
3
How To Enhance Security Operations with AI-Powered Defenses
Webinar
15:00 —
16:00, 26 February 2026
4
How to Harness Advanced Intelligence Capabilities to Strengthen Cyber Defence
Webinar
15:00 —
16:00, 12 March 2026
5
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
16:00 —
17:00, 23 October 2025
6
Anthropic Rolls Out Claude Security for AI Vulnerability Scanning
News
1 May 2026
1
Inside the Code War: Defending Against Nation-State Cyber Threats
Podcast
20 April 2026
2
Interview: How YKK Is Securing the World’s Largest Zipper Manufacturing Operation
Interview
30 April 2026
3
CISA and Partners Publish Zero Trust Guidance For OT Security
News
30 April 2026
4
Most Cybersecurity Professionals Feel Undervalued and Underpaid
News
27 April 2026
5
Cyber Resilience Under Pressure: Can Your Organisation Prove Control When it Matters Most?
Webinar
11:00 —
12:00, 21 May 2026
6
Close