Infosecurity Magazine Features

  1. Profile Interview: Javvad Malik

    Michael Hill meets security super blogger and all-round nice guy Javvad Malik to learn how he became one of the most well-respected and genuinely liked individuals in the infosec industry

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  2. Crowdsourced Bug Bounty Programs: Security Gains Versus Potential Losses

    The pros and cons of crowdsourced bug bounty efforts

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

    2. Photo of Ben Sadeghipour

      Ben Sadeghipour

      Head of Hacker Education, HackerOne

  3. Trolling, Sexual Harassment and Murder Threats: The Dark Social Web

    Eleanor Dallaway investigates trolling in the infosecurity industry and discovers a more sinister culture of sexual harassment, bullying and murder threats

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  4. Q&A: Talya Parker

    Talya Parker reflects on her journey into the infosec industry, career flexibility and the need for better recruitment strategies in the sector

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. Cybersecurity's Economic Health Post-Pandemic

    How has the industry’s bottom line been impacted by COVID-19and what does the future economic health of the sector look like Infosecurity finds out

    1. Kathryn Pick

      Technology Writer

  6. FireEye Breach: A Tipping Point in Nation State Attacks

    Infosecurity assesses the impact of one of the largest state-sponsored campaigns of all time

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  7. How Threat Actors and Fake News Are Disrupting Vaccine Efforts

    As COVID-19 vaccines become a reality, how can cyber-threats and misinformation disrupt their delivery?

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  8. PAM in the Enterprise: Pros Versus Cons

    The benefits and drawbacks of implementing privileged access management in an organization

    1. Photo of Nish Gopal

      Nish Gopal

      Governance, Risk and Compliance Specialist

    2. Photo of Homayun Yaqub

      Homayun Yaqub

      Global Security Strategist, Forcepoint

  9. The Weaponization of Pen-Testing Tools

    How big an issue is the weaponization of pen-testing tools and how can it be mitigated?

    1. Davey Winder

  10. Q&A: Raef Meeuwisse

    Raef Meeuwisse sheds light on his infosec career journey, industry challenges and dream job

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  11. Cybersecurity and the Business: Aiming for Alignment

    Why the security function must successfully align itself with the various facets of the wider business.

    1. Photo of Kate O'Flaherty

      Kate O'Flaherty

      News Writer

  12. Securing Online Shopping in the Post-COVID World

    How retailers and online shoppers can protect themselves

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?