2
What’s Hot on Infosecurity Magazine?
Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks
News
1
NSA Publishes New Zero Trust Implementation Guidelines
News
2
Researchers Warn of New “Vect” RaaS Variant
News
3
SQL Injection Flaw Affects 40,000 WordPress Sites
News
4
DockerDash Exposes AI Supply Chain Weakness In Docker’s Ask Gordon
News
5
UK ICO Launches Investigation into X Over AI Generated Non-Consensual Sexual Imagery
News
6
Data Privacy Day: Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever
News Feature
1
Number of Cybersecurity Pros Surges 194% in Four Years
News
2
Bridging the InfoSec ↔ SaaS Divide: Securing Agentic AI and Precision Data Recovery (video)
Interview
3
Researchers Uncover 454,000+ Malicious Open Source Packages
News
4
Cybersecurity M&A Roundup: CrowdStrike and Palo Alto Networks Lead Investment in AI Security
News Feature
5
New CISA Guidance Targets Insider Threat Risks
News
6
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
1
Cyber Resilience in the AI Era: New Challenges and Opportunities
Webinar
2
Five Non-Negotiable Strategies to Get Identity Security Right in 2026
Webinar
3
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
4
How AI and Verifiable Credentials Are Redefining Digital Identities
Webinar
5
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
4
NCSC Set to Retire Web Check and Mail Check Tools
News
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
6
You Might Be Interested In
- What’s Next After the Big ‘Zero Trust’ Welcome Back to the Office?
- Study Finds 76% of Cybersecurity Professionals Believe AI Should Be Heavily Regulated
- 5 Ways to Secure Amazon S3 Buckets
- Risk Evaluation and Management in the Age of the Connected Supply Chain
- Measure and Manage Your Cloud Security in Five Steps
- #Infosec2025: Demand More of Your Vendors to Ease Quantum Transition