Infosecurity Magazine

Infosecurity Magazine

Online Audio and Video Media

Richmond, Surrey 15,518 followers

Everyone and everything you need to know in Information Security.

About us

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts. Infosecurity Magazine also provides free educational content featuring: an established webinar channel, whitepaper syndication programs & industry leading virtual conferences all of which are endorsed by all major industry accreditation bodies, making Infosecurity Magazine a key learning resource for industry professionals. Infosecurity Magazine is proud to be part of the Infosecurity Group, a business unit owned and operated by Reed Exhibitions UK Ltd. Together with Infosecurity Europe & the Global Executive Network they form Infosecurity Group and invest continuous effort to support and drive the Information Security industry forward in person, in print and online.

Website
https://www.infosecurity-magazine.com/
Industry
Online Audio and Video Media
Company size
11-50 employees
Headquarters
Richmond, Surrey
Type
Public Company
Specialties
Information security, Online media, Online events, and Cyber Security

Locations

  • Primary

    Reed Exhibitions Ltd

    Gateway House 28 The Quadrant

    Richmond, Surrey TW9 1DN, GB

    Get directions

Employees at Infosecurity Magazine

Updates

  • As AI becomes an integral part of organisational operations, the challenges of managing associated risks are growing exponentially. Our upcoming webinar with AuditBoard will explore the evolving risk landscape of AI, focusing on key concerns such as ethics, compliance, and vulnerabilities, with a specific emphasis on European organisations Join us on January 23rd to learn strategies for evaluating AI-driven risks and implementing robust governance practices: https://bit.ly/3ZssHuz

    • No alternative text description for this image
  • With cyberattacks growing in sophistication and frequency, a survey by Gartner highlighted that 87% of CISOs and tech executives are planning to increase security spending by 2025. To optimize investments and meet these challenges, organizations are focusing on simplifying security strategies through innovations in identity and access management. Learn more about how 2025 trend predictions for the frontline workforce are shaping the future of security in the latest article by Imprivata: https://bit.ly/3ZAyux1

    • No alternative text description for this image
  • The Federal Communications Commission is looking to expand cybersecurity requirements for US telecommunications firms following the Salt Typhoon 🇨🇳 cyber-attack which impacted at least 8 US communications firms. The FCC has proposed a rule requiring communications firms to annually certify their cybersecurity risk management plans. Additionally, the Commission is seeking to clarify that telecommunications carriers have a legal obligation to protect their networks from unauthorized access and interception. These measures aim to strengthen the security of the nation's communications infrastructure. Read the full story here: https://bit.ly/4iy5w9E #FCC #China #US #SaltTyphoon #Cyberattack #cyberespionage #telcos #telecoms #Verizon #Lumen

    • No alternative text description for this image
  • In recent years, cyber risks in the energy sector have surged. Nation-state actors and cybercriminal groups are increasingly targeting Industrial Control Systems (ICS), many of which are Internet-connected and vulnerable to threats like unauthorized access, manipulation, and ransomware. Join us for a 30-minute webinar on December 19 and gain insights from a Censys expert on: ✅The current trends in internet-facing ICS device exposures ✅How to gain visibility into different types of ICS exposures today ✅Strategies to mitigate cyber risks in these devices Register today: https://bit.ly/4gj9od1

    • No alternative text description for this image
  • The Federal Bureau of Investigation (FBI) has issued new guidance for the public to protect themselves from criminals who are using generative AI to enhance financial fraud schemes. A new alert from the US government agency’s Internet Crime Complaint Center (IC3) highlighted how these tools enable malicious actors to commit fraud on a larger scale and increase the believability of their schemes. Read the full article: https://bit.ly/4fn6Hpw

    • No alternative text description for this image
  • A recent survey by Red-Button: DDoS Experts found that only 25% of organizations feel fully prepared to respond to DDoS attacks. Despite having protection technologies in place, many businesses remain uncertain about their defenses, often due to a lack of actionable insights from proper testing. Testing is the only way to uncover potential vulnerabilities, but effective testing requires knowing what to look for and challenging common misconceptions. Redbutton’s latest feature explores how organizations can gain clarity and confidence in their DDoS defenses. Read more here: https://bit.ly/4fnazGV

    • No alternative text description for this image
  • With NIS2 set to be fully implemented by 2025, many security leaders are reaching out to providers to understand its impact. This directive aims to create a more mature and unified cybersecurity landscape across the EU, but the question is: How will it affect your organization? In this article by BreachLock, Inc., we cover: 🔹 The regulated sectors impacted by NIS2 🔹 Key requirements for mandated industries 🔹 How security providers can help organizations prepare and comply Read the full article to ensure your organization is ready for NIS2 compliance: https://bit.ly/3B5svrD

    • No alternative text description for this image
  • Cyberattacks in 2024 have caused significant disruption across industries, targeting organizations and critical services at an alarming scale. Massive amounts of personal data have been stolen, often sold to malicious actors or used for extortion. Notable trends include a surge in ransomware attacks on healthcare, a sector cybercriminals no longer consider off-limits. We've compiled a list of the top 10 cyberattacks of 2024, ranked by data loss, recovery costs, real-world impacts, and geopolitical implications. Read the full article to learn more: https://bit.ly/3VvhZRm

  • Infosecurity Magazine reposted this

    Cybersecurity challenges in Formula E are particularly critical, as races span 10 locations and victories hinge on fractions of a second—downtime is simply not an option. In this data-driven sport, a ransomware attack could cost a championship team races and valuable points. During an event at Porsche’s site in Germany, Infosecurity spoke with Friedemann Kurz, Porsche AG Motorsport’s Head of IT, about how he approaches cybersecurity for the team, ensuring availability and supporting championship success: https://bit.ly/4g2Zuvq

    • No alternative text description for this image
  • Cybersecurity challenges in Formula E are particularly critical, as races span 10 locations and victories hinge on fractions of a second—downtime is simply not an option. In this data-driven sport, a ransomware attack could cost a championship team races and valuable points. During an event at Porsche’s site in Germany, Infosecurity spoke with Friedemann Kurz, Porsche AG Motorsport’s Head of IT, about how he approaches cybersecurity for the team, ensuring availability and supporting championship success: https://bit.ly/4g2Zuvq

    • No alternative text description for this image

Similar pages

Browse jobs