Infosecurity Magazine

Infosecurity Magazine

Online Audio and Video Media

Richmond, Surrey 15,681 followers

Everyone and everything you need to know in Information Security.

About us

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts. Infosecurity Magazine also provides free educational content featuring: an established webinar channel, whitepaper syndication programs & industry leading virtual conferences all of which are endorsed by all major industry accreditation bodies, making Infosecurity Magazine a key learning resource for industry professionals. Infosecurity Magazine is proud to be part of the Infosecurity Group, a business unit owned and operated by Reed Exhibitions UK Ltd. Together with Infosecurity Europe & the Global Executive Network they form Infosecurity Group and invest continuous effort to support and drive the Information Security industry forward in person, in print and online.

Industry
Online Audio and Video Media
Company size
11-50 employees
Headquarters
Richmond, Surrey
Type
Public Company
Specialties
Information security, Online media, Online events, and Cyber Security

Locations

  • Primary

    Reed Exhibitions Ltd

    Gateway House 28 The Quadrant

    Richmond, Surrey TW9 1DN, GB

    Get directions

Employees at Infosecurity Magazine

Updates

  • Evolving threats demand evolving strategies. A CISO's role is no longer just about defense—it's about driving innovation, enabling business value, and building a resilient security posture. Join our virtual summit on February 18 to gain critical insights into the most pressing issues facing CISOs today, learn about the soft skills needed to influence leadership effectively, and explore strategies and tools essential for thriving in today's challenging environment. Register today! https://bit.ly/3CsCOqi

    • No alternative text description for this image
  • Remote access exploitation emerged as a significant threat in 2024, as attackers increasingly target tools like VPNs and RDP, often exploiting poor access controls and outdated software. A recent article by Netskope highlighted the importance of securing remote access solutions in the age of hybrid work. Key measures include implementing multi-factor authentication, ensuring proper configurations, and keeping software up to date. Additionally, proactive monitoring and a strong incident response plan are vital to strengthening defenses against this growing attack vector. Read the full article here: https://bit.ly/42yUPOA

    • No alternative text description for this image
  • ISACA’s latest report reveals a concerning trend. Over half of European data protection professionals expect budget cuts in 2025, with many technical privacy teams remaining understaffed. This underfunding is impacting security and compliance, with only 38% confident in safeguarding sensitive data. Key challenges include compliance, resource shortages and tech innovation. Despite these pressures, privacy training for non-privacy staff is on the rise to bridge skills gaps. 🔗 Discover more insights from ISACA’s State of Privacy in 2025 report: https://bit.ly/42s3lP9 #Privacy #budget #security #cybersecurity #budgetcuts #ISACA #GDPR #compliance

    • No alternative text description for this image
  • In today's rapidly evolving threat landscape, CISOs must go beyond traditional security roles to become strategic partners Our Virtual Summit on February 18 will delve into the essential behaviors that empower CISOs to effectively influence leadership, position security as a value-adding proposition, and shift towards a resilience-based approach. Join us to discover... - Proven techniques to build strong relationships with C-suite executives and board members - Strategies to align security initiatives with broader organizational goals - The benefits of a holistic approach to security that prioritizes business continuity Register here: https://bit.ly/3CsCOqi

    • No alternative text description for this image
  • The DORA compliance deadline has arrived, reshaping how banks and their software suppliers handle resilience, security, and software automation. Our webinar with Sonatype on January 30th will show how financial organizations can enhance compliance frameworks with scalable software automation to meet DORA requirements and streamline operations. Learn from practical examples of organizations using automation to optimize software supply chain management, driving resilience and operational excellence. Register today to ensure your organization not only complies with DORA but also builds a future-ready, automated foundation for resilience and success: https://bit.ly/40gtPAs

    • No alternative text description for this image
  • As AI technologies advance, they bring both unprecedented opportunities and new challenges Our Virtual Summit on February 18 will explore how AI is reshaping the cybersecurity landscape, from augmenting existing attack vectors to fortifying defenses and how you can prepare for your GenAI investment. Join us to learn.... - How AI is being used to augment existing attack vectors - How GenAI and LLMs are being targeted through AI poisoning and jailbreaks - Strategies for integrating AI into your cybersecurity framework and considerations when investing in GenAI tools - Predictions on future trends to help you stay ahead of the curve Register today: https://bit.ly/3CsCOqi

    • No alternative text description for this image
  • Two Russian ransomware groups have reportedly targeted corporate victims with sophisticated social engineering tactics. 🔎 These groups, tracked by Sophos as STAC5143 and STAC5777, bombard victims with spam emails and follow up with fake IT support calls, urging them to install remote access software for data theft and extortion. The groups share characteristics with well-known threat actors, FIN7 and Storm-1811, respectively. 👉 Read more to learn about these novel intrusion tactics: https://bit.ly/40vTs0w #ransomware #FIN7 #BlackBasta #RMM #Teams #MicrosoftTeams #MSTeams #TTPs #dataprotection #ITSecurity #Sophos

    • No alternative text description for this image
  • In today's digital age, integrating advanced software solutions like Accounts Payable (AP) automation is crucial for operational efficiency. As businesses increasingly rely on digital platforms, protecting sensitive financial data becomes paramount. AP Automation software addresses this need by offering robust data protection measures while streamlining processes; it strengthens data security by incorporating advanced security features, minimizing human errors, and ensuring regulatory compliance. Discover more in this article by Quadient: https://bit.ly/4jyLBrr

    • No alternative text description for this image
  • Infosecurity Magazine reposted this

    View profile for James Coker, graphic

    Deputy Editor, Infosecurity Magazine, RX Global

    This year's annual Data Privacy Week kicks off today, and at Infosecurity Magazine we are excited to start our coverage with an interview with Box's Chief Privacy Officer Leah Perry. Leah P. explained how the role of CPO has changed amid surging global privacy regulation and the AI revolution. Other areas covered in the interview include: ✅ How to achieve compliance with privacy laws across different regions 🤝 The importance of building consumer trust with AI tools amid growing adoption of the technology within products and services 🦾 The biggest successes and challenges in the privacy industry today Read these insights today, and keep an eye out for the rest of our Data Privacy Week coverage over the coming days! https://lnkd.in/dyHS44bZ #DataPrivacyWeek #privacy #ai #compliance

    • No alternative text description for this image
  • Active Directory is a staple for 90% of organizations, but this popularity makes it a prime target for cybercriminals. Cyber attackers are quick to exploit AD vulnerabilities, leading to ransomware attacks and data theft. To tackle these threats, many are turning to Zero Trust and Zero Standing Privilege (ZSP) strategies. However, managing access rights is tricky with employees constantly joining, shifting roles, or leaving. Discover more about how to mitigate identity risk management in the latest article by One Identity: https://bit.ly/4hhXIY2

    • No alternative text description for this image

Similar pages

Browse jobs