9
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
What’s Hot on Infosecurity Magazine?
Critical Flaw Exposes 60,000 Redis Servers to Remote Exploitation
News
1
Ransomware Group “Trinity of Chaos” Launches Data Leak Site
News
2
Qilin Claims Ransomware Attack on Mecklenburg Schools
News
3
Discord Reveals Data Breach Following Third-Party Compromise
News
4
Europol Calls for Stronger Data Laws to Combat Cybercrime
News
5
Asahi Confirms Ransomware Attack, Data Stolen from Servers
News
6
Scanning of Palo Alto Portals Surges 500%
News
1
AI Tops Cybersecurity Investment Priorities, PwC Finds
News
2
Ransomware Group “Trinity of Chaos” Launches Data Leak Site
News
3
Free VPN Apps Found Riddled With Security Flaws
News
4
National Cyber Authorities Launch OT Security Guidance
News
5
Hackers Target Unpatched Flaws in Oracle E-Business Suite
News
6
The Invisible Frontline: Proactive Approaches to Browser Defense
Webinar
1
Mastering Identity and Access for Non-Human Cloud Entities
Webinar
2
Predicting and Prioritizing Cyber Attacks Using Threat Intelligence
Webinar
3
Strategic AI in Cyber Defense: How to Stay Ahead Without Increasing Risk
Webinar
4
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
Webinar
5
Enhance Your Business Resilience by Securing Your Mainframe
Webinar
6
Why Shadow AI Is the Next Big Governance Challenge for CISOs
News Feature
1
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
2
ING’s CISO on How Emerging Tech and Regulations are Reshaping Cybersecurity in Finance
Interview
3
How Security Teams Can Manage Agentic AI Risks
Opinion
4
NCSC: Patch Critical Oracle EBS Bug Now
News
5
Free VPN Apps Found Riddled With Security Flaws
News
6
You Might Be Interested In
- #GartnerSEC: Top Projects for 2020 Include Authentication, Risk Management and Cloud
- Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure
- Seattle to Host Major New Cybersecurity Event
- Test Results for Cloud Service Provider Native Firewalls
- The Exploitation of Cloud Services Continues in 2022
- Infosecurity Magazine Autumn Online Summit 2024: Day Two