2
What’s Hot on Infosecurity Magazine?
Google Disrupts Extensive Residential Proxy Networks
News
1
Number of Cybersecurity Pros Surges 194% in Four Years
News
2
World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
News
3
Notepad++ Update Hijacking Linked to Hosting Provider Compromise
News
4
Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks
News
5
France Fines National Employment Agency €5m Over 2024 Data Breach
News
6
Data Privacy Day: Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever
News Feature
1
Number of Cybersecurity Pros Surges 194% in Four Years
News
2
New CISA Guidance Targets Insider Threat Risks
News
3
Researchers Uncover 454,000+ Malicious Open Source Packages
News
4
World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
News
5
CISA Releases List of Post-Quantum Cryptography Product Categories
News
6
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
1
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
2
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
3
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
4
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
5
How AI and Verifiable Credentials Are Redefining Digital Identities
Webinar
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
4
NCSC Set to Retire Web Check and Mail Check Tools
News
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
6
You Might Be Interested In
- #HowTo: Implement Continuous Compliance for Kubernetes
- Malvertisers Fool Google With AI-Generated Decoys
- Nice Quotes, But I Wouldn’t Take Cybersecurity Advice from Alphonse Karr
- Why Modern Security Teams can no Longer Overlook Benefits of Orchestration
- Coming out of the COVID Depression with a Cloud Security Strategy
- Security in the Cloud: Where Your Responsibility Begins and the Cloud Provider’s Ends