Infosecurity News

  1. #Infosec2025: Top Six Cyber Trends CISOs Need to Know

    Experts at Infosecurity Europe 2025 highlighted a range of major industry trends, from advanced social engineering techniques to vulnerability exploits

  2. #Infosec2025: Cybersecurity Lessons From Maersk’s Former CISO

    2017 ransomware attack on shipping company A P Moller Maersk marked a turning point for the cybersecurity industry, according to its former CISO Adam Banks

  3. #Infosec2025: DNS Hijacking, A Major Cyber Threat for the UK Government

    During Infosecurity Europe 2025, Nick Woodcraft, from the UK Government, shared his experience in implementing measures to protect domains within the .gov.uk DNS namespace

  4. #Infosec2025: Ransomware Victims Urged to Engage to Take Back Control

    Engagement with ransomware actors doesn’t necessarily mean payment; it’s about getting the best outcomes, a leading negotiator had argued

  5. #Infosec2025: Know Your Audience to Make an Impact, CISOs Tell Their Peers

    A panel of CISOs at Infosecurity Europe urged their peers to use risk management and clear communication to tame a chaotic cyber landscape

  6. #Infosec2025: Threat Actors Weaponizing Hardware Devices to Exploit Fortified Environments

    Sophisticated nation-state and cybercriminal groups are using insiders to infect targets via hardware devices, despite a lack of reporting of this threat

  7. #Infosec2025: Defenders and Attackers are Locked in an AI Arms Race

    Malicious actors are making more use of AI in attacks, even as governments look to boost AI investments

  8. #Infosec2025: Seven Steps to Building a Mature Vulnerability Management Program

    At Infosecurity Europe 2025, Axonius’ Jon Ridyard proposed seven best practices to build mature vulnerability management processes

  9. #Infosec2025: Securing Endpoints is Still Vital Amid Changing Threats

    Endpoint and network security is still essential, even as malicious actors turn to supply chains, identities and AI

  10. #Infosec2025 Cloud-Native Technology Prompts New Security Approaches

    Moving to cloud-native architecture and modern platforms is allowing enterprises to automate operations and improve security

  11. #Infosec2025: Cybersecurity Support Networks Too Fragmented for SMBs, Say Experts

    Experts argue the case for “communities of support” to boost SMB cyber-resilience

  12. #Infosec2025: Simplicity Should Guide Cybersecurity Purchasing Decisions

    Experts argue that CISOs should avoid product duplication and simplify their language to ensure budget is spent wisely

  13. #Infosec2025: Concern Grows Over Agentic AI Security Risks

    Agentic AI systems could threaten security and data privacy, unless organizations test each model and component

  14. Phishing Campaign Uses Fake Booking.com Emails to Deliver Malware

    A phishing campaign spoofing Booking.com has been observed targeting hospitality sector, using ClickFix to install malware

  15. #Infosec2025: UK Retail Hack Was "Subtle," Not Complex, Says River Island CISO

    The attacks on UK retailers are “a wake-up call” for the industry, said River Island’s Information Security Officer

  16. Widespread Campaign Targets Cybercriminals and Gamers

    Sophos has uncovered a scheme planting malicious code in 130+ GitHub repositories, targeting hackers and gamers

  17. #Infosec2025: Device Theft Causes More Data Loss Than Ransomware

    Stolen devices are a bigger cause of data loss than stolen credentials or ransomware, according to a new Blancco study

  18. #Infosec2025: Startups Focus on Visibility and Governance, not AI

    Startups at Infosecurity Europe focus on attack surface management and improving security data, even as some new vendors avoid AI-led marketing

  19. #Infosec2025: Majority of Compromises Caused by Stolen Credentials, No MFA

    Rapid7 found that 56% of all compromises in Q1 2025 resulted from the theft of valid account credentials with no MFA in place

  20. #Infosec2025: Channel Bridges Security Skills Gap

    Resellers and channel partners can add value, fill gaps in security teams and offer expertise in niche markets

What’s hot on Infosecurity Magazine?