As AI becomes an integral part of organisational operations, the challenges of managing associated risks are growing exponentially. Our upcoming webinar with AuditBoard will explore the evolving risk landscape of AI, focusing on key concerns such as ethics, compliance, and vulnerabilities, with a specific emphasis on European organisations Join us on January 23rd to learn strategies for evaluating AI-driven risks and implementing robust governance practices: https://bit.ly/3ZssHuz
Infosecurity Magazine
Online Audio and Video Media
Richmond, Surrey 15,518 followers
Everyone and everything you need to know in Information Security.
About us
Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts. Infosecurity Magazine also provides free educational content featuring: an established webinar channel, whitepaper syndication programs & industry leading virtual conferences all of which are endorsed by all major industry accreditation bodies, making Infosecurity Magazine a key learning resource for industry professionals. Infosecurity Magazine is proud to be part of the Infosecurity Group, a business unit owned and operated by Reed Exhibitions UK Ltd. Together with Infosecurity Europe & the Global Executive Network they form Infosecurity Group and invest continuous effort to support and drive the Information Security industry forward in person, in print and online.
- Website
-
https://www.infosecurity-magazine.com/
External link for Infosecurity Magazine
- Industry
- Online Audio and Video Media
- Company size
- 11-50 employees
- Headquarters
- Richmond, Surrey
- Type
- Public Company
- Specialties
- Information security, Online media, Online events, and Cyber Security
Locations
-
Primary
Reed Exhibitions Ltd
Gateway House 28 The Quadrant
Richmond, Surrey TW9 1DN, GB
Employees at Infosecurity Magazine
-
James Coker
Deputy Editor, Infosecurity Magazine, RX Global
-
Adewale Adedeji
Contributor at Infosecurity Magazine
-
Ayodele Johnson
Digital PR & Content Writer | Helping Businesses of All Sizes Boost SEO & Drive Revenue
-
Michael Chukwube
Experienced Digital PR Strategist || Content Writer || Tech Enthusiast || Published on Clutch, TheManifest, Tripwire, Dzone, HackerNoon, and more.
Updates
-
With cyberattacks growing in sophistication and frequency, a survey by Gartner highlighted that 87% of CISOs and tech executives are planning to increase security spending by 2025. To optimize investments and meet these challenges, organizations are focusing on simplifying security strategies through innovations in identity and access management. Learn more about how 2025 trend predictions for the frontline workforce are shaping the future of security in the latest article by Imprivata: https://bit.ly/3ZAyux1
-
The Federal Communications Commission is looking to expand cybersecurity requirements for US telecommunications firms following the Salt Typhoon 🇨🇳 cyber-attack which impacted at least 8 US communications firms. The FCC has proposed a rule requiring communications firms to annually certify their cybersecurity risk management plans. Additionally, the Commission is seeking to clarify that telecommunications carriers have a legal obligation to protect their networks from unauthorized access and interception. These measures aim to strengthen the security of the nation's communications infrastructure. Read the full story here: https://bit.ly/4iy5w9E #FCC #China #US #SaltTyphoon #Cyberattack #cyberespionage #telcos #telecoms #Verizon #Lumen
-
In recent years, cyber risks in the energy sector have surged. Nation-state actors and cybercriminal groups are increasingly targeting Industrial Control Systems (ICS), many of which are Internet-connected and vulnerable to threats like unauthorized access, manipulation, and ransomware. Join us for a 30-minute webinar on December 19 and gain insights from a Censys expert on: ✅The current trends in internet-facing ICS device exposures ✅How to gain visibility into different types of ICS exposures today ✅Strategies to mitigate cyber risks in these devices Register today: https://bit.ly/4gj9od1
-
The Federal Bureau of Investigation (FBI) has issued new guidance for the public to protect themselves from criminals who are using generative AI to enhance financial fraud schemes. A new alert from the US government agency’s Internet Crime Complaint Center (IC3) highlighted how these tools enable malicious actors to commit fraud on a larger scale and increase the believability of their schemes. Read the full article: https://bit.ly/4fn6Hpw
-
A recent survey by Red-Button: DDoS Experts found that only 25% of organizations feel fully prepared to respond to DDoS attacks. Despite having protection technologies in place, many businesses remain uncertain about their defenses, often due to a lack of actionable insights from proper testing. Testing is the only way to uncover potential vulnerabilities, but effective testing requires knowing what to look for and challenging common misconceptions. Redbutton’s latest feature explores how organizations can gain clarity and confidence in their DDoS defenses. Read more here: https://bit.ly/4fnazGV
-
With NIS2 set to be fully implemented by 2025, many security leaders are reaching out to providers to understand its impact. This directive aims to create a more mature and unified cybersecurity landscape across the EU, but the question is: How will it affect your organization? In this article by BreachLock, Inc., we cover: 🔹 The regulated sectors impacted by NIS2 🔹 Key requirements for mandated industries 🔹 How security providers can help organizations prepare and comply Read the full article to ensure your organization is ready for NIS2 compliance: https://bit.ly/3B5svrD
-
Cyberattacks in 2024 have caused significant disruption across industries, targeting organizations and critical services at an alarming scale. Massive amounts of personal data have been stolen, often sold to malicious actors or used for extortion. Notable trends include a surge in ransomware attacks on healthcare, a sector cybercriminals no longer consider off-limits. We've compiled a list of the top 10 cyberattacks of 2024, ranked by data loss, recovery costs, real-world impacts, and geopolitical implications. Read the full article to learn more: https://bit.ly/3VvhZRm
-
Infosecurity Magazine reposted this
Cybersecurity challenges in Formula E are particularly critical, as races span 10 locations and victories hinge on fractions of a second—downtime is simply not an option. In this data-driven sport, a ransomware attack could cost a championship team races and valuable points. During an event at Porsche’s site in Germany, Infosecurity spoke with Friedemann Kurz, Porsche AG Motorsport’s Head of IT, about how he approaches cybersecurity for the team, ensuring availability and supporting championship success: https://bit.ly/4g2Zuvq
-
Cybersecurity challenges in Formula E are particularly critical, as races span 10 locations and victories hinge on fractions of a second—downtime is simply not an option. In this data-driven sport, a ransomware attack could cost a championship team races and valuable points. During an event at Porsche’s site in Germany, Infosecurity spoke with Friedemann Kurz, Porsche AG Motorsport’s Head of IT, about how he approaches cybersecurity for the team, ensuring availability and supporting championship success: https://bit.ly/4g2Zuvq