Infosecurity Magazine Features
Sharing is Caring: Using Intelligence to Fight Cybercrime
James Coker asks how law enforcement can use cyber threat intelligence more effectively in their efforts to bring more cyber-criminals to justice
AI: End of the SOC as We Know It vs. A SOC That's Staying Put
Carsten Maple argues tech advances mean the end of the current SOC, while Milad Aslaner argues the SOC will become more relevant
Tales From the Meeting Room: Cyber’s Sexism Challenge
James Coker explores the scale of sexist behaviors in meetings in the cyber industry
Infosec Rock Stars: The Sham, The Myth, The Legends
Eleanor Dallaway unpacks the infosec industry's obsession with fame
5 Best Practices for Mitigating DDoS Attacks
To mitigate the danger posed by DDoS attacks, especially ransom-related DDoS attacks, follow these five best practices
Ask The Experts: How To Respond to a Data Breach Effectively
Infosecurity invited three information security experts to share their thoughts and advice on how to respond to a data breach effectively
Zero Trust: Essential in the Modern World vs. Unrealistic and Too Expensive
Jordon Kelly says that zero trust is needed to counter increasingly sophisticated cyber threats, but Callum Roxan believes this approach does not make sense for many organizations
Why the Future of Cybersecurity is AI
As cyber-attacks continue to swell and there's a danger from AI-weaponization, the only effective solution is artificial intelligence
Protecting Healthcare Data: The Challenges Posed by NHS Digital's GPDPR
Kate O’Flaherty investigates both the benefits and the concerns of NHS Digital’s GPDPR
Top 5 Best Practices for Cloud Security
Learn how to keep data safer in the cloud with these five best security practices
Biden and Cybersecurity: A Six-Month Performance Review
Danny Bradbury looks at how President Biden has fared thus far in protecting America’s interests in cyberspace
Back to School: Why the Education Sector Must Learn the Art of Good Cybersecurity
With schools, colleges and universities increasingly in the crosshairs of threat actors, Phil Muncaster asks experts how the industry can better protect itself