Infosecurity Magazine Features
Profile Interview: Javvad Malik
Michael Hill meets security super blogger and all-round nice guy Javvad Malik to learn how he became one of the most well-respected and genuinely liked individuals in the infosec industry
Crowdsourced Bug Bounty Programs: Security Gains Versus Potential Losses
The pros and cons of crowdsourced bug bounty efforts
Trolling, Sexual Harassment and Murder Threats: The Dark Social Web
Eleanor Dallaway investigates trolling in the infosecurity industry and discovers a more sinister culture of sexual harassment, bullying and murder threats
Q&A: Talya Parker
Talya Parker reflects on her journey into the infosec industry, career flexibility and the need for better recruitment strategies in the sector
Cybersecurity's Economic Health Post-Pandemic
How has the industry’s bottom line been impacted by COVID-19and what does the future economic health of the sector look like Infosecurity finds out
FireEye Breach: A Tipping Point in Nation State Attacks
Infosecurity assesses the impact of one of the largest state-sponsored campaigns of all time
How Threat Actors and Fake News Are Disrupting Vaccine Efforts
As COVID-19 vaccines become a reality, how can cyber-threats and misinformation disrupt their delivery?
PAM in the Enterprise: Pros Versus Cons
The benefits and drawbacks of implementing privileged access management in an organization
The Weaponization of Pen-Testing Tools
How big an issue is the weaponization of pen-testing tools and how can it be mitigated?
Q&A: Raef Meeuwisse
Raef Meeuwisse sheds light on his infosec career journey, industry challenges and dream job
Cybersecurity and the Business: Aiming for Alignment
Why the security function must successfully align itself with the various facets of the wider business.
Securing Online Shopping in the Post-COVID World
How retailers and online shoppers can protect themselves