Infosecurity Magazine Features
US Federal Privacy Legislation: Challenges on the Hill
Danny Bradbury investigates the spider-web of state and agency laws that attempt to tackle data privacy in the US
Top 10: Fines Issued for Data Protection Violations
What are the 10 biggest fines issued by regulators for data protection violations?
Ask The Experts: How to Reassure Your Customers About Your Security and Privacy Frameworks
Three security experts advise how to smoothly embark your customers on a secure path
Securing a Galaxy Far, Far Away: Cybersecurity’s Final Frontier
James Coker examines what it will take to secure the space arena now and into the future
Business Email Compromise Is Dead, Long Live Cyber-Enabled Financial Fraud
With a surge in global financial losses due to BEC, this social engineering attack can no longer be exclusively treated as a simple financial incident. Kevin Poireault investigates why security teams need to battle financial fraud
Joining the Dots: How to Optimize Cyber Threat Intelligence for the Win
Phil Muncaster investigates what can be done to consolidate and deliver the information network defenders need
Shifting Mindset: Tackling Mental Health Head On
Beth Maundrill investigates the problems and how mental health is intrinsically linked to the cybersecurity skills shortage
Point/Counterpoint: Are We Moving to a Passwordless Future?
Two cybersecurity experts debate whether we are moving towards a passwordless future
In-Flight Cyber-Attacks
Find out how realistic the threat to planes in the air is and what security measures airlines should be putting in place to secure live aircraft
Carrot or Stick: is NIS2 the Way Forward?
Alex Meehan asks whether the EU's updated NIS Directive is sufficient for the modern threat environment
Point/Counterpoint: Should Organizations Adapt Their Cybersecurity Posture in Light of the Russia-Ukraine Conflict?
Two experts assess what companies need to change in their security approach in light of the Ukraine war
Cybersecurity’s Age Old Question
James Coker explores an under-discussed area of diversity in context of information security – age