News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Stephen Pritchard
Stephen Pritchard
Freelance Writer,
Infosecurity Magazine
Inside the Cyber Extortion Boom: Phishing Gangs and Crime-as-a-Service Trends
News Feature
2 January 2026
The Evolving Cybersecurity Challenge for Critical Infrastructure
News Feature
1 January 2026
Soft Market, Hard Choices: The State of Cyber Insurance
News Feature
31 December 2025
#Infosec2025: Cybersecurity Lessons From Maersk’s Former CISO
News
5 June 2025
#Infosec2025: Defenders and Attackers are Locked in an AI Arms Race
News
5 June 2025
#Infosec2025: Securing Endpoints is Still Vital Amid Changing Threats
News
5 June 2025
#Infosec2025 Cloud-Native Technology Prompts New Security Approaches
News
4 June 2025
#Infosec2025: Concern Grows Over Agentic AI Security Risks
News
4 June 2025
#Infosec2025: Startups Focus on Visibility and Governance, not AI
News
4 June 2025
#Infosec2025: Channel Bridges Security Skills Gap
News
3 June 2025
Infostealers Cause Surge in Ransomware Attacks, Just One in Three Recover Data
News
19 September 2024
Western Agencies Warn Risk from Chinese-Controlled Botnet
News
19 September 2024
Critical Infrastructure at Risk From Email Security Breaches
News
18 September 2024
Google Street View Images Used For Extortion Scams
News
18 September 2024
US Looks to Align Security Across Government
News
17 September 2024
ICO Acts Against Sky Betting and Gaming Over Cookies
News
17 September 2024
White House to Tackle AI-Generated Sexual Abuse Images
News
16 September 2024
Advanced Phishing Attacks Put X Accounts at Risk
News
16 September 2024
Irish Data Protection Regulator to Investigate Google AI
News
12 September 2024
Schools Face Million-Dollar Bills as Ransomware Rises
News
12 September 2024
Operational Technology Leaves Itself Open to Cyber-Attack
News
11 September 2024
Gallup: Pollster Acts to Close Down Security Threat
News
11 September 2024
Highline Public Schools Forced to Close By Cyber-Attack
News
10 September 2024
China-Linked Threat Actors Target Taiwan Military Industry
News
10 September 2024
Technology Causes “Digital Entropy” as Firms Struggle With Governance
News
9 September 2024
DDoS Attacks Double With Governments Most Targeted
News
9 September 2024
PyPI Revival Hijack Puts Thousands of Applications at Risk
News
5 September 2024
Security Budgets Come Under Pressure as “Hypergrowth” Ends
News
5 September 2024
US Government Set Out to Improve Internet Routing Security
News
4 September 2024
North Korea Targeting Crypto Industry, Says FBI
News
4 September 2024
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds
News
25 February 2026
1
Shai-Hulud-Like Worm Targets Developers via npm and AI Tools
News
23 February 2026
2
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls
News
23 February 2026
3
Jackpotting Surge Costs Banks Over $20m, Warns FBI
News
23 February 2026
4
Exploitable Vulnerabilities Present in 87% of Organizations
News
26 February 2026
5
UK's Data Watchdog Gets a Makeover to Match Growing Demands
News
26 February 2026
6
AI-powered Cyber-Attacks Up Significantly in the Last Year, Warns CrowdStrike
News
24 February 2026
1
New Zero-Click Flaw in Claude Desktop Extensions, Anthropic Declines Fix
News
9 February 2026
2
Shai-Hulud-Like Worm Targets Developers via npm and AI Tools
News
23 February 2026
3
Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
News
19 February 2026
4
Future-Proofing Critical Infrastructure: National Gas CTO Darren Curley on IT/OT Security Integration
Interview
18 February 2026
5
Why Ransomware Remains One of Cybersecurity’s Most Persistent and Costly Threats
News Feature
17 February 2026
6
How To Enhance Security Operations with AI-Powered Defenses
Webinar
15:00 —
16:00, 26 February 2026
1
What’s Next for AI Identity in 2026
Webinar
16:00 —
16:25, 24 February 2026
2
Why Your Organisation Needs Trusted Time Synchronisation
Webinar
15:00 —
16:00, 19 February 2026
3
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
15:00 —
16:00, 22 January 2026
4
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
16:00 —
17:00, 23 October 2025
5
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
6
The Intelligence Edge: Clarity, Context and the Human Advantage in Modern CTI
Webinar
15:00 —
16:00, 12 March 2026
1
Future-Proofing Critical Infrastructure: National Gas CTO Darren Curley on IT/OT Security Integration
Interview
18 February 2026
2
Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
News
3 February 2026
3
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls
News
23 February 2026
4
Why Ransomware Remains One of Cybersecurity’s Most Persistent and Costly Threats
News Feature
17 February 2026
5
Psychology, AI and the Modern Security Program: A CISO’s Guide to Human Centric Defence
Opinion
6 February 2026
6
Close