Infosecurity Magazine

  • Home
  • Infosecurity Magazine

Infosecurity Magazine Dedicated to serving the Information Security community; online, face-to-face and in print.

Infosecurity Magazine has almost ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts.

29/07/2024

In an era of escalating cyber threats and economic uncertainty, how can you maximize security with limited resources?

Join us on September 10th at our Online Summit, where we'll be joined by cybersecurity luminaries to discuss how to:

- Optimize security investments for maximum risk reduction
- Enhance team capabilities
- Align security initiatives with core business objectives
- Develop a risk-based approach tailored to SME constraints

Strategic resource allocation is paramount, our Online Summit will equip you with the knowledge to make informed decisions that protect your organization without overextending your budget.

Register now for the September 10th Online Summit and invest in your organization's future security: https://bit.ly/3YmNijT

26/07/2024

On September 11th, we'll be tackling one of the most pressing issues in cybersecurity at our Online Summit: developing a modern vulnerability management program that's truly aligned with business risk.

Traditional approaches to vulnerability management are no longer sufficient as the sheer volume of vulnerabilities, coupled with the rapid pace of technological change, demands a more sophisticated strategy.

This discussion at the Online Summit isn't just about patching holes in your defenses- it's about fundamentally rethinking how we approach risk in the digital age. We'll explore:

- Why a one-size-fits-all approach to vulnerability management is failing organizations
- How to prioritize vulnerabilities based on real , not just technical severity
- Strategies for integrating into your broader risk management framework
- The role of and in scaling your efforts without sacrificing accuracy

Register today to gain insights that could reshape your entire security posture: https://bit.ly/3SjoaGR

Quantum computing might seem far off, but experts warn of imminent cybersecurity threats if we don't address quantum ris...
26/07/2024

Quantum computing might seem far off, but experts warn of imminent cybersecurity threats if we don't address quantum risks now.

In November 2023, UK Finance highlighted the potential of quantum computing to compromise the UK's entire payment system. Infosecurity interviewed Philip Intallura, Global Head of Quantum Technologies at HSBC, who discussed the proactive steps HSBC is taking. These initiatives, both internal and in collaboration with partners, aim to future-proof the security of their customers' information.

Prepare your systems for being quantum-secure in the future by reading the full interview here: https://bit.ly/3WwGT46

NullBulge, a new threat actor, claims to have stolen and leaked over 1.1TB of data from Disney’s internal Slack channels...
25/07/2024

NullBulge, a new threat actor, claims to have stolen and leaked over 1.1TB of data from Disney’s internal Slack channels.

The data includes a complete 10,000-channel data dump encompassing files, messages, unreleased projects, raw images and code.

The group claims to be a hacktivist group protecting artists' rights and ensuring fair compensation for their work. “We believe AI-generated artwork harms the creative industry and should be discouraged,” the group said on its website.

🐭 Read our story on the Disney hack: https://bit.ly/4f9Nf0D

🕵️ Find out who is behind NullBulge: https://bit.ly/4bSsXpu

24/07/2024

Many small and medium businesses believe they're too insignificant for hackers to notice. This dangerous myth has left countless organizations exposed as in reality, cybercriminals often target smaller companies, viewing them as low-hanging fruit with potentially weaker defenses.

The consequences can be devastating: data theft, encrypted customer information, and ransom demands in untraceable cryptocurrency are just the beginning.

One Identity's article reinforces that every organization needs robust cybersecurity measures to protect against both external threats and insider risks: https://bit.ly/46gmDaf

The upcoming Paris Olympics will host 15,000 athletes across 40 venues, with 350,000 hours of footage broadcast worldwid...
23/07/2024

The upcoming Paris Olympics will host 15,000 athletes across 40 venues, with 350,000 hours of footage broadcast worldwide. Ensuring cybersecurity for an event of this scale is paramount.

Franz Regul, CISO and managing director of cybersecurity for the Paris 2024 Organizing Committee (COJOP), spoke with Infosecurity Magazine in an exclusive interview about the extensive preparations. For four years, Regul has collaborated with the International Olympic Committee (IOC) and French government agencies to build a robust digital defense strategy and a secure environment for both athletes and spectators.

Read the full interview to learn about the cybersecurity challenges and solutions for this global sporting event: https://bit.ly/4da0zAg

Google Lines Up $23bn Swoop For Startup Wiz Google is reportedly planning what could be the biggest acquisition in the f...
23/07/2024

Google Lines Up $23bn Swoop For Startup Wiz

Google is reportedly planning what could be the biggest acquisition in the firm’s history. The tech giant is in advanced talks to buy Wiz Security for an estimated $23bn.

Wiz, founded in 2020, is an Israeli cloud security company valued at $12bn.

🔗 Read our full story here: https://bit.ly/4bVKZHB

Security teams know compromises are inevitable. But swift, intelligent threat hunting can identify and eliminate threats...
22/07/2024

Security teams know compromises are inevitable. But swift, intelligent threat hunting can identify and eliminate threats before they spread.

Intelligence-driven behavioral threat hunting is revolutionizing how we detect and eliminate threats before they cause significant damage.

Join Intel 471 for a concise, information-packed 30-minute webinar on July 25th to uncover how behavioral threat hunting can identify precursors to ransomware attacks and improve your security posture: https://bit.ly/3Y8ggDO

22/07/2024

In today's digital landscape, technology alone isn't enough to protect your organization. The real key? Your team.

As cyber threats evolve at breakneck speed, CISOs face a dual challenge: staying ahead of attackers while building and maintaining a top-tier security team. The skills gap is widening, competition for talent is fierce, and burnout is a constant threat.

On September 10th, industry leaders will gather for our Online Summit to tackle these pressing issues head-on. We'll explore innovative strategies for:

- Attracting high-caliber security professionals in a competitive market
- Developing and nurturing your existing talent pool
- Creating a workplace culture that retains your best and brightest
- Balancing automation with human expertise for maximum effectiveness

Register for your free ticket here: https://bit.ly/4dcZTua

19/07/2024

Day 2 of the Online Summit on September 11 offers panel debates, keynote presentations, and practical how-to sessions that provide critical insights into the future of cyber and how to develop modern vulnerability programs tailored to business and prioritization

The summit will also address:
✔️Early identification of potential insider threats
✔️Strategies for creating environments that discourage such incidents
✔️The practical of generative in security teams, focusing on safe deployment and maximizing impact on cybersecurity operations

Register now: https://bit.ly/3LiXQsf

A suspected problem with an update for CrowdStrike's    , a cloud-managed security solution, is causing global IT disrup...
19/07/2024

A suspected problem with an update for CrowdStrike's , a cloud-managed security solution, is causing global IT disruptions across critical sectors such as airlines, banks, media and retailing. The issue affects Microsoft Windows systems, resulting in boot failures and the 'blue screen of death'.

A workaround users could put in place has been shared widely on social media, but ’s current official advice to customers appears to be to take no further action, and to monitor updates until a resolution is found.

Crowdstrike customers have been advised to refer to the support portal for latest updates.

For more information on this rapidly evolving situation, read our full article here: https://bit.ly/3LuwsaV

19/07/2024

A recent Cloud Security Alliance survey revealed that over 70% of European organizations now prioritize SaaS cybersecurity, it also highlighted malicious applications as the top SaaS security threat in Europe for 2023, with 44% of surveyed organizations reporting such incidents.

Adaptive Shield's latest article explores this trend further and explains the many gaps that still need to be addressed as well as the challenges posed by third-party connected apps and strategies to enhance SaaS Security Posture Management (SSPM). As threats evolve, staying informed is crucial.

Read the full article to learn how to strengthen your organization's SaaS security: https://bit.ly/3xGxvS4

18/07/2024

Over $1bn in Cryptocurrency Lost to Web3 Cyber Incidents in 2024

💸 According to CertiK, over $1.1bn worth of cryptocurrency has been lost from Web3 cybersecurity incidents in the first half of 2024.

📊 These losses occurred across 408 onchain security incidents over the six-month period, making the average cost to victims per incident $2.9m. The median loss was $230,784, highlighting the wide disparity between the losses suffered during individual attacks.

Read the full story here: https://bit.ly/3Wgk0ls

As the retail sector embraces digital technology and complex supply chains, cybersecurity has become a critical concern....
17/07/2024

As the retail sector embraces digital technology and complex supply chains, cybersecurity has become a critical concern.

Jerry Geisler, SVP and Global CISO at Walmart, shared his insights with Infosecurity Magazine on managing cybersecurity across the retail giant's vast network of 10,500 stores and 2.1 million global associates as well as sector-wide challenges, including the safe integration of AI and how Walmart is tackling the cyber skills shortage by launching courses and programs to help upskill people.

For advice and insights from an industry giant, read more: https://bit.ly/462Ie5W

16/07/2024

The European Union Opens Applications for Cybersecurity and Digital Skills Funding
The European Commission has opened applications for over €210m ($227.3m) in funding for cybersecurity and digital skills programs.
The objectives include:

▪️ Supporting and enlarge national and cross border security operation centers (via the EU Cyber Solidarity Act)
▪️ Supporting the implementation of EU laws on cybersecurity and national cybersecurity strategies like the updated NIS2 Directive and the Cyber Resilience Act
▪️ Tackling Disinformation (via European Digital Media Observatories)

🔗 Read the full story here: https://bit.ly/4cw277M

15/07/2024

We're thrilled to announce the return of our Online Summit this September!

Mark your calendars for September 10th as we kick off Day 1 with cutting-edge sessions led by top information security experts.

A panel of security leaders will share innovative approaches for building and retaining effective cybersecurity teams in the current environment. We'll also address how can best utilize limited resources during economic uncertainty, as well as covering the latest techniques, helping you stay current with the evolving threat landscape.

Register now for this essential event for cybersecurity professionals: https://bit.ly/461VJTp

Threat actors are becoming increasingly sophisticated, employing techniques like fake account creations and account take...
15/07/2024

Threat actors are becoming increasingly sophisticated, employing techniques like fake account creations and account takeovers, as well as the use of bots to escalate the volume of these attacks

Join our upcoming webinar with DataDome on July 18th to hear our expert panel discuss the latest account fraud trends, evolving threat tactics, and security gaps

Register now: https://bit.ly/3RT6OQK

12/07/2024

The cybersecurity landscape is evolving, and so are its professionals.

Ameet Jugnauth, Vice President of the ISACA London Chapter, recently shared valuable insights with Infosecurity Magazine on this transformation and highlighted a key trend: the influx of professionals from non-technical backgrounds into cybersecurity and how this diversity is reshaping the industry's approach to protection.

Watch the full interview here: https://bit.ly/3XPjrju

In today's threat landscape, traditional password-based authentication is no longer sufficient.Multi-factor authenticati...
12/07/2024

In today's threat landscape, traditional password-based authentication is no longer sufficient.

Multi-factor authentication ( ), two-factor authentication ( ), and passwordless methods have become essential for robust security. Our recent Online Summit webinar explored how MFA failures can lead to hacks and cyber-attacks, and what a passwordless future looks like for organizations.

Catch up with this eye-opening webinar to hear from...
Roger Grimes, Data-Driven Defense Evangelist KnowBe4

Raul Zeppenfeldt Molina, Cybersecurity Expert PA Consulting Group

Camille Singleton, Manager, IBM X-Force Threat Intelligence IBM

Gregory Vigroux, PKI/FIDO Product Line Manager Thales Cloud Security

Watch the webinar now: https://bit.ly/4cu6vEe

New RUSI Report Exposes Psychological Toll of RansomwareA new report has shed light on the silent struggle of ransomware...
11/07/2024

New RUSI Report Exposes Psychological Toll of Ransomware

A new report has shed light on the silent struggle of ransomware victims: their mental well-being.

The psychological and physiological impact ransomware attacks have on individuals must be addressed by all incident response stakeholders, a report by the Royal United Services Institute outlined.

Read the full story here: https://bit.ly/3XSIF0u

10/07/2024

At Infosecurity Europe, Jake Humphrey and Damian Hughes from the High Performance Podcast shared invaluable insights gleaned from top achievers across various fields. Their message resonates strongly in the high-stakes world of cybersecurity: embrace failure in high-pressure environments as a catalyst for growth

Humphrey and Hughes emphasized that by reframing failures as learning opportunities, we can drive personal and professional development, and uncover innovative solutions to complex security challenges

For a dose of inspiration and to apply these high-performance principles to your cybersecurity career, watch the full interview here: https://bit.ly/3XNX4uU

10/07/2024

In today's hyper-connected world, the external attack surface is expanding faster than ever. With countless devices, networks, and cloud access points, cybersecurity professionals face an unprecedented challenge

Join us on July 11th for an eye-opening webinar with Intel 471 to discover:
- How cyber threat actors are eyeing your digital ecosystem
- Strategies to uncover and protect exposed assets
- Effective risk evaluation and mitigation techniques

Register here: https://bit.ly/3xRBwCY

TeamViewer Cyber-Attack Attributed to Russian APT Midnight BlizzardTeamViewer has been hit by a cyber-attack that it has...
09/07/2024

TeamViewer Cyber-Attack Attributed to Russian APT Midnight Blizzard

TeamViewer has been hit by a cyber-attack that it has attributed to Russian state-affiliated threat actor Midnight Blizzard (APT29).

The firm revealed it identified suspicious behavior on a standard employee account within its corporate IT environment on June 26. It has tied the incident to the credentials of that account.

TeamViewer said its security team was able to contain the attack within its corporate IT environment, with no evidence the threat actor gained access to its product environment or customer data.

Read the full story here: https://bit.ly/4bBv00V

08/07/2024

At Infosecurity Europe, we had an insightful conversation with Dr. Emma Philpott, CEO of The IASME Consortium, about the critical role of cyber certifications, the ways in which certifications support compliance and strengthen cyber defenses, as well as the tangible benefits they have for organizations.

Watch the full interview here: https://bit.ly/3RWqAuF

08/07/2024

The European Union recognized the need to bolster the operational resilience of financial institutions, acknowledging that a significant cyberattack could potentially undermine and overwhelm vulnerable financial entities, the EU created legislation to compel those in the financial sector to reduce their cyber risk. This includes EU-based banks, credit institutions, crowdfunding platforms, and crypto-asset service providers.

The Digital Operational Resilience Act (DORA) is already in effect, but financial organizations have until January 17, 2025, to comply. Organizations looking to avoid regulatory scrutiny should consider implementing a SaaS Security Posture Management (SSPM) solution to secure their SaaS stack.

For a detailed exploration of how DORA impacts EU financial institutions and strategies for compliance, read the full article by Adaptive Shield:
https://bit.ly/4bufynt

05/07/2024

At Infosecurity Europe, Purvi Kay, Head of Cyber Security Governance, Risk and Compliance at BAE Systems, addressed two critical topics. She emphasized the importance of courageously delivering unfavorable news to present a comprehensive picture of cybersecurity challenges and their potential solutions.

Additionally, Kay passionately advocated for promoting neurodiversity in the cybersecurity field, highlighting the need to remove barriers to entry for neurodivergent individuals and create an environment where they can thrive in their roles.

Watch the full interview here:https://bit.ly/4bpbR2j

Account fraud is escalating, with threat actors using advanced tactics like fake accounts, account takeovers, and bots t...
05/07/2024

Account fraud is escalating, with threat actors using advanced tactics like fake accounts, account takeovers, and bots to target organizations.

Join our webinar with DataDome on July 18th to learn the latest account fraud trends from expert speakers who will cover the industries being hit hardest as well as providing best practices to combat these threats using AI anomaly detection and other robust defense approaches.

Stay ahead of the next wave of account fraud and register now:https://bit.ly/3L30ORv

04/07/2024

Fake Law Firms Con Victims of Crypto Scams

According to the FBI, victims of cryptocurrency scams have lost nearly $10m over the past year to fraudsters claiming to be lawyers who can help them recover their losses.

The law enforcement agency has issued a new Public Service Announcement (PSA) urging victims to be on the lookout for predatorial .

Read the full story here: https://bit.ly/3RNBbba

03/07/2024

During an interview at Infosecurity Europe, Richard Meeus, Akamai's Director of Security Technology & Strategy, shared worrying insights about cybersecurity trends, revealing that the EMEA region is facing the most rapid increase in DDoS attacks globally.

Meeus also addressed geopolitical factors as potential drivers behind this surge in attacks, linking current events to the cybersecurity situation across regions.

Watch the full interview here: https://bit.ly/3KxHM5J

03/07/2024

Research by the British Chambers of Commerce shows less than 30% of firms expect a fully in-person workforce over the next 5 years. Some have adopted Bring Your Own Device (BYOD) policies, allowing employees to access company data on personal devices.

While BYOD can provide cost savings and productivity gains, it presents significant security risks as personal devices often lack proper protection like antivirus, firewalls, and encryption found on corporate devices.

Read our article by Microsoft to discover why we should carefully consider the security risks of BYOD in enterprise environments:https://bit.ly/3XzogNS

Address


Alerts

Be the first to know and let us send you an email when Infosecurity Magazine posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Infosecurity Magazine:

Videos

Shortcuts

  • Address
  • Alerts
  • Contact The Business
  • Videos
  • Claim ownership or report listing
  • Want your business to be the top-listed Media Company?

Share