News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Tara Seals
Tara Seals
US/North America News Reporter,
Infosecurity Magazine
70% of Energy IT Pros Fear 'Catastrophic Failure' from Cyber-Attacks
News
18 Apr 2018
IT Managers Lack Visibility into Almost Half of Network Traffic
News
18 Apr 2018
Cryptominers Replace Ransomware as No. 1 Threat
News
17 Apr 2018
ISACA: Gender Disparity in Cyber Persists
News
17 Apr 2018
Facebook, Microsoft and 32 Others Form Cyber Consortium
News
17 Apr 2018
A Pair of Mobile Apps in Google Play Target Mideast Victims
News
16 Apr 2018
Most Web Apps Contain High-Severity Vulnerabilities
News
16 Apr 2018
University of Virginia Nabs Top Honors in Collegiate Cyber Contest
News
16 Apr 2018
Early Bird Code Injection Gets the Obfuscation Worm
News
13 Apr 2018
Scammers Bank on Cryptocurrency with Fake Apps
News
13 Apr 2018
Cybercriminals Earn Millions, And Spend It Wildly
News
13 Apr 2018
Nation-State Attacks Take 500% Longer to Find
News
12 Apr 2018
Google Will Distrust Additional CAs, IT Pros Predict
News
12 Apr 2018
UK Launches Offensive Cyber-Weapons Against Islamic State
News
12 Apr 2018
Crypto-Mining Spikes 500% on Corporate Networks
News
10 Apr 2018
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
#Infosec2025: Top Six Cyber Trends CISOs Need to Know
News
6 Jun 2025
1
Scattered Spider Uses Tech Vendor Impersonation and Phishing Kits to Target Helpdesks
News
6 Jun 2025
2
#Infosec2025: Concern Grows Over Agentic AI Security Risks
News
4 Jun 2025
3
#Infosec2025: Ransomware Victims Urged to Engage to Take Back Control
News
5 Jun 2025
4
#Infosec2025: Threat Actors Weaponizing Hardware Devices to Exploit Fortified Environments
News
5 Jun 2025
5
#Infosec2025: Seven Steps to Building a Mature Vulnerability Management Program
News
5 Jun 2025
6
Trump Budget Plan to Cut Nearly 1000 Jobs at Cyber Agency CISA
News
3 Jun 2025
1
NIST Introduces New Metric to Measure Likelihood of Vulnerability Exploits
News
26 May 2025
2
Sophisticated Malware Campaign Targets Windows and Linux Systems
News
2 Jun 2025
3
Cybersecurity Teams Generate Average of $36M in Business Growth
News
29 May 2025
4
#Infosec2025: Concern Grows Over Agentic AI Security Risks
News
4 Jun 2025
5
Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
News
2 Jun 2025
6
Cybersecurity Employment: Making Sense of Conflicting Messaging
Webinar
19 May 2025
1
How to Tackle Rising Cloud Identity Attacks
Webinar
27 Mar 2025
2
Reimagining Digital Identity in the Age of AI: Challenges and Innovations
Webinar
27 Mar 2025
3
Safeguarding Critical Supply Chain Data Through Effective Risk Assessment
Webinar
10 Apr 2025
4
Cyber Resilience in the AI Era: New Challenges and Opportunities
Webinar
25 Mar 2025
5
The Threat Intelligence Imperative: Transforming Risk into Cyber Resilience
Webinar
13 Mar 2025
6
#Infosec2025: How CISOs Can Manage Budgets Effectively Amid Spending Restraints with Madelein van der Hout (video)
Interview
5 Jun 2025
1
Scattered Spider Uses Tech Vendor Impersonation and Phishing Kits to Target Helpdesks
News
6 Jun 2025
2
#Infosec2025: Understanding AI's Role in Exploiting Human Cyber Vulnerabilities (video)
Interview
5 Jun 2025
3
How to Incentivize Security by Design
News Feature
26 May 2025
4
Reimagining Digital Identity in the Age of AI: Challenges and Innovations
Webinar
27 Mar 2025
5
#Infosec2025: NCA Cyber Intel Head on Cybercrime's New Post-Trust Era (video)
Interview
3 Jun 2025
6