News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Stephen Pritchard
Stephen Pritchard
Freelance Writer,
Infosecurity Magazine
Inside the Cyber Extortion Boom: Phishing Gangs and Crime-as-a-Service Trends
News Feature
2 January 2026
The Evolving Cybersecurity Challenge for Critical Infrastructure
News Feature
1 January 2026
Soft Market, Hard Choices: The State of Cyber Insurance
News Feature
31 December 2025
#Infosec2025: Cybersecurity Lessons From Maersk’s Former CISO
News
5 June 2025
#Infosec2025: Defenders and Attackers are Locked in an AI Arms Race
News
5 June 2025
#Infosec2025: Securing Endpoints is Still Vital Amid Changing Threats
News
5 June 2025
#Infosec2025 Cloud-Native Technology Prompts New Security Approaches
News
4 June 2025
#Infosec2025: Concern Grows Over Agentic AI Security Risks
News
4 June 2025
#Infosec2025: Startups Focus on Visibility and Governance, not AI
News
4 June 2025
#Infosec2025: Channel Bridges Security Skills Gap
News
3 June 2025
Infostealers Cause Surge in Ransomware Attacks, Just One in Three Recover Data
News
19 September 2024
Western Agencies Warn Risk from Chinese-Controlled Botnet
News
19 September 2024
Critical Infrastructure at Risk From Email Security Breaches
News
18 September 2024
Google Street View Images Used For Extortion Scams
News
18 September 2024
US Looks to Align Security Across Government
News
17 September 2024
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core
News
27 January 2026
1
World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
News
27 January 2026
2
EU Unveils Cybersecurity Overhaul with Proposed Update to Cybersecurity Act
News
21 January 2026
3
Abacus Market Shutters After Exit Scam, Say Experts
News
15 July 2025
4
Autonomous System Uncovers Long-Standing OpenSSL Flaws
News
28 January 2026
5
Critical and High Severity n8n Sandbox Flaws Allow RCE
News
28 January 2026
6
Zero-Day Exploits Surge, Nearly 30% of Flaws Attacked Before Disclosure
News
22 January 2026
1
Securing AI for Cyber Resilience: Building Trustworthy and Secure AI Systems
Blog
8 December 2025
2
AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'
News
20 January 2026
3
EU Unveils Cybersecurity Overhaul with Proposed Update to Cybersecurity Act
News
21 January 2026
4
LinkedIn Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs
News
20 January 2026
5
Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience
Opinion
2 January 2026
6
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
15:00 —
16:00, 22 January 2026
1
Five Non-Negotiable Strategies to Get Identity Security Right in 2026
Webinar
18:00 —
18:30, 22 January 2026
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
4
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
5
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6