Infosecurity News Features

  1. Threat Intelligence: The Role of Nation-States in Attributing Cyber-Attacks

    While Ukraine and its Western allies are increasingly using cyber attribution as a geopolitical tool, many experts claim that it’s limited until an international legal ground has been found

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

    2. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  2. Cyber-Attacks in the Media Industry Making Headlines

    Why are media organizations so vulnerable to cyber-attacks?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  3. Threat Intelligence: Do We Need A 'Rosetta Stone' of Cyber Attribution?

    Threat groups are tracked under many different names, and there are good reasons for that

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  4. Unpacking Recent Government TikTok Bans

    TikTok's data practices are coming under growing scrutiny in the Western world, leading to bans on using the app in governments

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  5. February's M&A News Roundup

    Buyers and sellers from the cybersecurity industry were once again reluctant to share financial terms regarding February’s deals

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  6. Threat intelligence: Why Attributing Cyber-Attacks Matters

    While cyber attribution has become much more challenging with the emergence of cybercrime-as-a-service, threat intelligence analysts argue it is still valuable to anticipate future attacks

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  7. Cyber Sanctions: An Effective Weapon or Just Posturing?

    Cyber sanctions are increasingly used by governments in response to cybercrime, but are they having the desired effect?

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  8. Russia-Ukraine: New Norms in Cyber Warfare Emerging

    Defence and cybersecurity analysts consider the cybersecurity implications the conflict and why cyber-Armageddon has not yet been realized

    1. Photo of Gerrard  Cowan

      Gerrard Cowan

      Freelance Journalist and Editor

  9. The US Government’s Open Source Security Policy Discussed

    Camille Stewart Gloster and Anjana Rajan from the ONCD discuss how the federal government plans to help enhance security in open source software

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  10. Next-Gen: How A Security Researcher Turned EDRs Into Wipers Using 0-Day Exploits

    Or Yair, a SafeBreach security researcher, developed a proof of concept to create a next-gen wiper using EDR tools to wipe files

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  11. January's M&A News Roundup

    Cybersecurity buyers and sellers remained cagey regarding January’s deals

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  12. #DataPrivacyWeek: Addressing ChatGPT's Shortfalls in Data Protection Law Compliance

    OpenAI needs to better address whether its language model ChatGPT is compliant with data protection regulations across the world, experts say

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

What’s hot on Infosecurity Magazine?