Infosecurity Magazine

@InfosecurityMag

The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.

London and New York
Joined April 2009

Tweets

You blocked @InfosecurityMag

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @InfosecurityMag

  1. Pinned Tweet
    Dec 7

    Register for our with in 3 days where Russ Miller - , Heath Renfrow - & & help you to better secure & manage your employees’ access in & out of the office>>

    Undo
  2. Tune into our with in 30 minutes to discover how integration and process automation can help create self-sustaining risk-based programs for your business>>

    Undo
  3. 1 hour ago

    We have another coming up today - join us in an hour for our session with on what you need to know about risk-based for your organization:

    Undo
  4. 2 hours ago

    Thanks to our experts Russ Miller - , Heath Renfrow - & & for sharing their insights at our latest with . If you missed it, you can now catch it on-demand

    Undo
  5. 2 hours ago
    Undo
  6. 3 hours ago

    Vade Secure Appoints Ex-Israeli Military Staff Sergeant Maya Gershon as CRO

    Undo
  7. 3 hours ago

    We are now live! Join our with as Russ Miller - , Heath Renfrow - & & provide the inside track to any device from anywhere>>

    Undo
  8. 3 hours ago
    Undo
  9. 3 hours ago

    How do ensure your team's personal devices meet standards? Join our with in 30 minutes to address the challenges posed by a environment

    Undo
  10. 4 hours ago
    Undo
  11. 5 hours ago
    Undo
  12. 5 hours ago
    Undo
  13. 5 hours ago

    On Day 10 of , recommends why you should “Always look for ways to say “Yes” to a request, rather than defaulting to “No”. "

    Undo
  14. 5 hours ago

    Who were the winners of the 2020 awards? Check out the 15 winners were selected by a combination of public vote and a panel of judges including here>>

    Undo
  15. 5 hours ago

    : North Korea’s Cyber-Offense Strategy Evolving to Focus on International Economic Targets

    Undo
  16. 6 hours ago

    Achieving Complete Control Across Your SaaS Applications: Is it Possible?

    Undo
  17. 6 hours ago

    For Most Companies, Securing Remote Work is Unfinished Business

    Undo
  18. 6 hours ago

    Decrypting Diversity and Inclusion in Cybersecurity

    Undo
  19. 6 hours ago
    Undo
  20. 6 hours ago

    A recent investigation by uncovered a new cyber-espionage campaign using popular social media and platforms to target high ranking political figures in the Middle East.

    Undo
  21. 7 hours ago

    Tune in to our with at 3 pm GMT to look at how the move to access evolved to encompass access from anywhere >>

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·