InfosecurityMag Profile Banner
Infosecurity Magazine Profile
Infosecurity Magazine

@InfosecurityMag

Followers
241K
Following
3K
Media
13K
Statuses
70K

The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.

London and New York
Joined April 2009
Don't wanna be here? Send us removal request.
@InfosecurityMag
Infosecurity Magazine
8 days
Cyber threats are rising- and so are the regulatory demands. Join @auditboard on July 17 for a must-attend session to understand what DORA, NIS2, and the EU AI Act really mean for your organization:
Tweet media one
0
2
9
@InfosecurityMag
Infosecurity Magazine
1 day
Stop Blaming the Victim: Why the Fight Against Cybercrime Needs to Change
2
7
10
@InfosecurityMag
Infosecurity Magazine
1 day
Your annual pen test is a snapshot: useful for a moment, outdated by tomorrow. In dynamic IT environments, security needs to move faster. @outpost24 argues that combining continuous security monitoring with expert-led, on-demand testing shifts pen testing from a compliance
Tweet media one
0
1
0
@InfosecurityMag
Infosecurity Magazine
1 day
Ransomware: Hunters International Is Not Shutting Down, It's Rebranding
0
2
4
@InfosecurityMag
Infosecurity Magazine
1 day
Taiwan Flags Chinese Apps Over Data Security Violations
0
2
7
@InfosecurityMag
Infosecurity Magazine
1 day
EU Launches Plan to Implement Quantum-Secure Infrastructure
1
3
8
@InfosecurityMag
Infosecurity Magazine
2 days
Privilege Escalation Flaw Found in Azure Machine Learning Service
1
8
11
@InfosecurityMag
Infosecurity Magazine
2 days
CVE Program Launches Two New Forums to Enhance CVE Utilization
0
1
2
@InfosecurityMag
Infosecurity Magazine
2 days
Automation and Vulnerability Exploitation Drive Mass Ransomware Breaches
0
2
2
@InfosecurityMag
Infosecurity Magazine
2 days
North Korean Hackers Target Crypto Firms with Novel macOS Malware
0
4
9
@InfosecurityMag
Infosecurity Magazine
2 days
A Common Good Cyber Fund has been launched, designed to support the work of non-profits organizations that deliver core cybersecurity services for the wider public good. Read our full story here:
Tweet media one
0
0
2
@InfosecurityMag
Infosecurity Magazine
2 days
Linux Users Urged to Patch Critical Sudo CVE
0
1
4
@InfosecurityMag
Infosecurity Magazine
3 days
Android SMS Stealer Infects 100,000 Devices in Uzbekistan
0
2
4
@InfosecurityMag
Infosecurity Magazine
3 days
From WestJet to Qantas: The Rising Cyber Threats Impacting Major Airlines
1
2
3
@InfosecurityMag
Infosecurity Magazine
3 days
AI Models Mislead Users on Login URLs
0
3
4
@InfosecurityMag
Infosecurity Magazine
3 days
Remote access tools & IoT devices are expanding the attack surface. Check Point Software breaks down why continuous mapping of all assets is critical to maintaining a secure perimeter in today’s distributed environments:
Tweet media one
0
4
2
@InfosecurityMag
Infosecurity Magazine
3 days
How the NFL Manages Complex Cyber Risks in Live Sports Environments
0
1
2
@InfosecurityMag
Infosecurity Magazine
3 days
Chinese Hackers Target France in Ivanti Zero-Day Exploit Campaign
0
5
9
@InfosecurityMag
Infosecurity Magazine
3 days
US Treasury Sanctions Russian Bulletproof Hosting Service Aeza Group
0
1
3
@InfosecurityMag
Infosecurity Magazine
3 days
Dozens of Corporates Caught in Kelly Benefits Data Breach
0
3
9
@InfosecurityMag
Infosecurity Magazine
3 days
Qantas Reveals “Significant” Contact Center Data Breach
0
0
1