News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Tara Seals
Tara Seals
US/North America News Reporter,
Infosecurity Magazine
70% of Energy IT Pros Fear 'Catastrophic Failure' from Cyber-Attacks
News
18 April 2018
IT Managers Lack Visibility into Almost Half of Network Traffic
News
18 April 2018
Cryptominers Replace Ransomware as No. 1 Threat
News
17 April 2018
ISACA: Gender Disparity in Cyber Persists
News
17 April 2018
Facebook, Microsoft and 32 Others Form Cyber Consortium
News
17 April 2018
A Pair of Mobile Apps in Google Play Target Mideast Victims
News
16 April 2018
Most Web Apps Contain High-Severity Vulnerabilities
News
16 April 2018
University of Virginia Nabs Top Honors in Collegiate Cyber Contest
News
16 April 2018
Early Bird Code Injection Gets the Obfuscation Worm
News
13 April 2018
Scammers Bank on Cryptocurrency with Fake Apps
News
13 April 2018
Cybercriminals Earn Millions, And Spend It Wildly
News
13 April 2018
Nation-State Attacks Take 500% Longer to Find
News
12 April 2018
Google Will Distrust Additional CAs, IT Pros Predict
News
12 April 2018
UK Launches Offensive Cyber-Weapons Against Islamic State
News
12 April 2018
Crypto-Mining Spikes 500% on Corporate Networks
News
10 April 2018
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Hired to Hack: Protecting Your Business from Remote Recruitment Scams
Opinion
12 December 2025
1
South Korean Police Raid Coupang Over Data Breach as CEO Resigns
News
12 December 2025
2
Malware Discovered in 19 Visual Studio Code Extensions
News
11 December 2025
3
Google Fixes Zero Click Gemini Enterprise Flaw That Exposed Corporate Data
News
10 December 2025
4
Gartner Calls For Pause on AI Browser Use
News
9 December 2025
5
The Ursala of AI Wants Your Voice
Opinion
25 April 2025
6
Gartner Calls For Pause on AI Browser Use
News
9 December 2025
1
China-Linked Warp Panda Targets North American Firms in Espionage Campaign
News
5 December 2025
2
Hacker-Tested, Security-Leader Approved: Five Steps to Stop Modern Fraud
Opinion
5 December 2025
3
Pro-Russia Hackers Target US Critical Infrastructure in New Wave
News
10 December 2025
4
Smishing Triad Impersonation Campaigns Expand Globally
News
25 November 2025
5
Log4Shell Downloaded 40 Million Times in 2025
News
10 December 2025
6
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
1
Exposing AI’s Blind Spots: Security vs Safety in the Age of Gen AI
Webinar
12:30 —
13:30, 13 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
4
Mastering Identity and Access for Non-Human Cloud Entities
Webinar
14:00 —
16:00, 18 September 2025
5
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6