Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Russian state-backed hackers is shifting from disruption tactics, with the likes of wiper attacks, to cyber espionage → Read More
Information security compliance proves you can be trusted with sensitive customer data. Simply, it’s your license to sell. However, complying and keeping up with all the tasks associated to frameworks and the internal requirements you are managing can be very time-consuming and pose a real challenge to you and your team. In this webinar, you will hear first-hand from security experts the key… → Read More
With $10m in seed funding, Guardz looks to tackle cyber insurance for small businesses → Read More
Customer and employee data accounts for almost half all stolen data while credit cards and password see a decline → Read More
Before looking too far into the future it would be remiss not to take stock of the year that was 2022 → Read More
Leaked API keys allow threat actors to perform a variety of unauthorized actions → Read More
Cybersecurity professionals share their advice on how to maintain strong cybersecurity against economic pressures → Read More
Crowdsourced security refines and improves on the bug bounty concept, moving into the mainstream for numerous use cases, including penetration testing and attack surface management, to help solve problems that other approaches cannot. In this session you will learn about the drivers for, and value of, modern crowdsourced security, how to adopt and operationalize it gracefully and at scale, and… → Read More
During this session, we will reflect on the year, deep dive into what happened and explore lessons to be learnt. Join us to catch up on the years highlights and to put your knowledge to the test. → Read More
Infosecurity Magazine spoke to industry members about some of the key cybersecurity challenges to be mindful of today. → Read More
Consumers should protect themselves by using least-privilege principles → Read More
Warning to orgnaizations to be aware of risky devices across IT, IoT, OT and IoMT → Read More
Many admitted to sending messages on Teams they should not have → Read More
Ukraine looks to enhance European integration with ENISA special partner status → Read More
Some of the malicious apps are able to evade detection and continue to make it onto legitimate app stores → Read More
CEOs put cybersecurity seventh behind near-term risks such as the economy and potential recession → Read More
The European nation has seen a spike in DDoS attacks throughout August → Read More
A quick introduction from the new editor at Infosecurity Magazine → Read More
With the defence vehicle market set to grow substantially over the next decade Mercedes-Benz Special Trucks unveiled its new version of the Zetros truck after ... → Read More
L3Harris is looking at the next generation evolution of its Enhanced Night Vision Goggle-Binocular (ENVG-B) for the US Army by connecting the solution to a ... → Read More