News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Tara Seals
Tara Seals
US/North America News Reporter,
Infosecurity Magazine
70% of Energy IT Pros Fear 'Catastrophic Failure' from Cyber-Attacks
News
18 April 2018
IT Managers Lack Visibility into Almost Half of Network Traffic
News
18 April 2018
Cryptominers Replace Ransomware as No. 1 Threat
News
17 April 2018
ISACA: Gender Disparity in Cyber Persists
News
17 April 2018
Facebook, Microsoft and 32 Others Form Cyber Consortium
News
17 April 2018
A Pair of Mobile Apps in Google Play Target Mideast Victims
News
16 April 2018
Most Web Apps Contain High-Severity Vulnerabilities
News
16 April 2018
University of Virginia Nabs Top Honors in Collegiate Cyber Contest
News
16 April 2018
Early Bird Code Injection Gets the Obfuscation Worm
News
13 April 2018
Scammers Bank on Cryptocurrency with Fake Apps
News
13 April 2018
Cybercriminals Earn Millions, And Spend It Wildly
News
13 April 2018
Nation-State Attacks Take 500% Longer to Find
News
12 April 2018
Google Will Distrust Additional CAs, IT Pros Predict
News
12 April 2018
UK Launches Offensive Cyber-Weapons Against Islamic State
News
12 April 2018
Crypto-Mining Spikes 500% on Corporate Networks
News
10 April 2018
Orgs Are Holding Back on Cloud-Based Security
News
10 April 2018
Organizations Failing at Timely Detection of Threats
News
10 April 2018
Brazilian Criminals Use HTTP Injectors to Gain Free Mobile Internet Access
News
9 April 2018
17% of Workers Fall for Social Engineering Attacks
News
9 April 2018
Fraudsters Are Stealing Corporate Funds with Tampered Debit Cards
News
9 April 2018
Raróg Crypto-Miner Allows Affordable Criminality
News
6 April 2018
One-Fifth of Open-Source Serverless Apps Have Critical Vulnerabilities
News
6 April 2018
Sears/Delta Card Breach Widens to Include Best Buy
News
6 April 2018
Sears, Kmart and Delta Hit with Payment-Card Breach
News
5 April 2018
Rampant Misconfigurations Expose 1.5 Billion Sensitive Corporate Files
News
5 April 2018
100% of Web Apps Contain Vulnerabilities
News
5 April 2018
Half of Cyber-Pros Believe They're Losing the Fight
News
4 April 2018
2.7 Million UK Businesses Wide Open to IoT Hacks
News
4 April 2018
DHS Detects Cell-Phone Spy Gear in DC
News
4 April 2018
Americans Resigned to ID Theft, But Taking Steps
News
3 April 2018
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability
News
5 February 2026
1
Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
News
3 February 2026
2
Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover
News
4 February 2026
3
Smartphones Now Involved in Nearly Every Police Investigation
News
5 February 2026
4
AI Drives Doubling of Phishing Attacks in a Year
News
4 February 2026
5
SolarWinds Web Help Desk Vulnerability Actively Exploited
News
4 February 2026
6
NSA Publishes New Zero Trust Implementation Guidelines
News
2 February 2026
1
Cybersecurity M&A Roundup: CrowdStrike and Palo Alto Networks Lead Investment in AI Security
News Feature
2 February 2026
2
Data Privacy Day: Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever
News Feature
28 January 2026
3
Over 80% of Ethical Hackers Now Use AI
News
27 January 2026
4
New CISA Guidance Targets Insider Threat Risks
News
29 January 2026
5
Number of Cybersecurity Pros Surges 194% in Four Years
News
29 January 2026
6
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
15:00 —
16:00, 22 January 2026
1
Five Non-Negotiable Strategies to Get Identity Security Right in 2026
Webinar
18:00 —
18:30, 22 January 2026
2
How to Implement Attack Surface Management in the AI and Cloud Age
Webinar
15:00 —
16:00, 3 April 2025
3
Cyber Resilience in the AI Era: New Challenges and Opportunities
Webinar
15:00 —
16:00, 25 March 2025
4
Safeguarding Critical Supply Chain Data Through Effective Risk Assessment
Webinar
15:00 —
16:00, 10 April 2025
5
Dispelling the Myths of Defense-Grade Cybersecurity
Webinar
11:00 —
12:00, 4 December 2024
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6
Close