2
What’s Hot on Infosecurity Magazine?
Google Disrupts Extensive Residential Proxy Networks
News
1
Number of Cybersecurity Pros Surges 194% in Four Years
News
2
World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
News
3
Notepad++ Update Hijacking Linked to Hosting Provider Compromise
News
4
Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks
News
5
France Fines National Employment Agency €5m Over 2024 Data Breach
News
6
Data Privacy Day: Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever
News Feature
1
Number of Cybersecurity Pros Surges 194% in Four Years
News
2
New CISA Guidance Targets Insider Threat Risks
News
3
Researchers Uncover 454,000+ Malicious Open Source Packages
News
4
World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
News
5
CISA Releases List of Post-Quantum Cryptography Product Categories
News
6
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
1
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
2
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
3
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
4
How AI and Verifiable Credentials Are Redefining Digital Identities
Webinar
5
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
4
NCSC Set to Retire Web Check and Mail Check Tools
News
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
6
You Might Be Interested In
- VPN and RDP Exploitation the Most Common Attack Technique
- #BHUSA: Identity Compromise Now the Cause of Most Breaches, CrowdStrike Finds
- Building a Successful Data-Centric Audit and Compliance Program
- Look at the Past to Fight Today’s Attacks
- 48 Million Detailed Psychometric Records on Individuals Leaked
- ‘Secure’ Backup Company Leaks 135 Million Records Online