Twitter | Search | |
Infosecurity Mag
The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.
33,360
Tweets
918
Following
167,634
Followers
Tweets
Infosecurity Mag 53s
Microsoft, PayPal and Google Top the Brands Hit by Phishing
Reply Retweet Like
Infosecurity Mag 20m
Campaign Targets Critical Russian Infrastructure
Reply Retweet Like
Infosecurity Mag 2h
Explore the state of in 2018 & assess what changes we can expect in 2019. Register now & join this tomorrow!
Reply Retweet Like
Infosecurity Mag 5h
Most business, government & public-sector entities that process European Union residents’ personal need to modify their approaches to comply with the new regulation. Find out more in the report.
Reply Retweet Like
Infosecurity Mag 5h
Operation Sharpshooter Targets Nuke and Defense Firms
Reply Retweet Like
Infosecurity Mag 5h
AI Set to Supercharge Phishing in 2019
Reply Retweet Like
Infosecurity Mag 6h
2019 Privacy Compliance and Risk Management Strategies for Infosec Professionals
Reply Retweet Like
Infosecurity Mag 6h
Operation Sharpshooter Targets Nuke and Defense Firms
Reply Retweet Like
Infosecurity Mag 6h
'Keeping Secure in the Time of Digital Transformation' Earn 1 credit when you watch this & identify the tools you need to build an effective strategy
Reply Retweet Like
Infosecurity Mag 6h
The TrickBot and MikroTik Connection – A Story of Investment and Collaboration
Reply Retweet Like
Infosecurity Mag 6h
According to 86% of IT and organizations need to improve their awareness of as a security risk to the enterprise.
Reply Retweet Like
Infosecurity Mag 7h
programs take a combination of people, process and . Learn about the 4 categories of : govern, find, fix & prevent by downloading our whitepaper ‘A Practitioner's Guide to Application Security’.
Reply Retweet Like
Infosecurity Mag 8h
AI Set to Supercharge Phishing in 2019
Reply Retweet Like
Infosecurity Mag 8h
Amplification Bots Retweet Misinformation
Reply Retweet Like
Infosecurity Mag 8h
Microsoft and Adobe Patch 100+ Bugs in December
Reply Retweet Like
Infosecurity Mag 9h
Women and Diversity in Cybersecurity
Reply Retweet Like
Infosecurity Mag 21h
Security teams are put into new pressures as older applications are moving to web and -based applications. Find out what threat-centric is & what is driving its adoption in the real world with our report.
Reply Retweet Like
Infosecurity Mag 22h
Download this full report to discover findings from a investigation outlining how Russian operators conduct influence operations on Twitter and understand how can pose to private .
Reply Retweet Like
Infosecurity Mag 23h
Amplification Bots Retweet Misinformation
Reply Retweet Like
Infosecurity Mag 23h
House Report Says Equifax Breach Was Preventable
Reply Retweet Like