Infosecurity Blogs

  1. Rebuilding Digital Trust in the Age of Deepfakes

    Deepfakes are rapidly eroding digital trust, enabling fraud, social engineering and manipulation. Human detection is unreliable and traditional security measures fall short. Rebuilding trust requires proactive, AI-driven solutions, employee training, clear policies, and cross-team collaboration, alongside regulation and transparent communication to verify authenticity in real time

    1. Photo of Ricardo Amper

      Ricardo Amper

      Founder & CEO, Incode

  2. Inside the Chip: Rethinking Cybersecurity from the Ground Up

    Traditional defenses are no longer enough. As cyber threats burrow deeper into firmware and hardware, true protection must start at the source. This article explores a shift toward Hardware Root of Trust — embedding proactive, autonomous security inside the chip to redefine digital trust and resilience at the foundation

    1. Photo of Camellia Chan

      Camellia Chan

      CEO and founder, X-PHY, a Flexxon brand

  3. The Budget Effect of a Security Incident

    Explore why proactive SaaS data protection is essential as cyber threats evolve. Learn how rising attack vectors and AI adoption impact security budgets and why investing early reduces risk and long-term costs

    1. Photo of Carl  Brundage

      Carl Brundage

      Technical Architect, Salesforce

    2. Photo of Dr. Eoghan  Casey

      Dr. Eoghan Casey

      Field CTO, Salesforce

    3. Photo of Matthew O'Neill

      Matthew O'Neill

      Field CTO, Salesforce

  4. Energy Operations: Managing Password Security and Continuity

    Energy companies face rising credential-based cyber threats as IT and OT systems converge. The article explains how legacy equipment, shared accounts and operational pressures complicate strong authentication

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  5. Securing AI for Cyber Resilience: Building Trustworthy and Secure AI Systems

    Dr Vrizlynn Thing, SVP, Head of Cybersecurity Strategic Technology Centre at ST Engineering, shared how cyber-resilience principles can help organizations build AI that is secure, trustworthy, and robust

    1. Photo of Dr. Vrizlynn L. L. Thing

      Dr. Vrizlynn L. L. Thing

      SVP, Head of Cybersecurity Strategic Technology Centre, ST Engineering

  6. How to Fix OST File cannot be Opened Error

    In this article, Stellar highlights the possible causes behind this Outlook data file error and explain the troubleshooting methods to fix it

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  7. Elevating SaaS Security with NIST CSF and Agentic AI

    How do we strike the right balance between rapid innovation and maintaining airtight security in a SaaS-first, AI-driven landscape?

    1. Photo of Carl  Brundage

      Carl Brundage

      Technical Architect, Salesforce

    2. Photo of Dr. Eoghan  Casey

      Dr. Eoghan Casey

      Field CTO, Salesforce

    3. Photo of Matthew O'Neill

      Matthew O'Neill

      Field CTO, Salesforce

  8. Preparing for the Quantum Future: Lessons from Singapore

    As quantum computing advances, so is the race to secure our systems before “Q-day” when quantum machines can break today’s encryption. At GovWare 2025, Singapore’s role as a global testbed for quantum-safe innovation was highlighted, with insights from an expert at global technology, defense and engineering group ST Engineering

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  9. Passwords, MFA and AD Accounts: Hardening Your Environment for NIS2 Compliance

    In this article, learn how CISOs can strengthen Active Directory, enforce strong password policies and implement MFA to achieve NIS2 compliance

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  10. Ensuring Backup Compliance with SOC 2 and ISO 27001

    Learn how to make your backups fully compliant with SOC 2 Criteria and ISO 27001 Controls and pass an audit or certification

    1. Photo of Łukasz Dydek

      Łukasz Dydek

      Xopero Software / Gitprotect.io

  11. Beyond The Password Security Checkbox: Why Compliance Isn't Enough

    Compliance frameworks set essential cybersecurity standards, but checking boxes is not enough to prevent breaches. Continuous security requires proactive threat detection, breached password monitoring, and adaptive password policies that protect high-risk accounts. Specops Password Policy strengthens Active Directory defenses by bridging the gap between compliance, password security and real protection

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  12. Resilience At Risk: Talent and Governance in the Age of AI

    The cybersecurity talent gap is now a strategic risk, threatening national security, AI safety and enterprise resilience. Tech alone can't defend, skilled humans are essential to interpret threats and enforce accountability

    1. Photo of Adham Etoom

      Adham Etoom

      Cybersecurity Advisor, Program Manager

    2. Photo of Isheanesu  Sithole

      Isheanesu Sithole

      Past President of the ISACA Harare Chapter, ISACA

  13. SaaS Rolls Forward, Not Backward: Strategies to Prevent Data Loss and Downtime

    This article helps bridge the divide by showing how SaaS fundamentally changes Business Continuity and Disaster Recovery planning and data repair, particularly in the era of agentic AI

    1. Photo of Carl  Brundage

      Carl Brundage

      Technical Architect, Salesforce

    2. Photo of Dr. Eoghan  Casey

      Dr. Eoghan Casey

      Field CTO, Salesforce

    3. Photo of Matthew O'Neill

      Matthew O'Neill

      Field CTO, Salesforce

  14. Best Practices for SAP Identity Framework Migration

    Explore the impact of SAP IdM and GRC end-of-life by 2027 and discover key considerations for migrating to new identity and governance solutions

    1. Photo of Abdullah Ahmad

      Abdullah Ahmad

      Senior Solutions Architect, One Identity

  15. Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments

    Misalignment between InfoSec and SaaS teams creates an "InfoSec↔SaaS Divide," leading to delays and risk exposure. Bridging this operational gap is vital for securing SaaS data and unlocking the future benefits of agentic AI

    1. Photo of Carl  Brundage

      Carl Brundage

      Technical Architect, Salesforce

    2. Photo of Dr. Eoghan  Casey

      Dr. Eoghan Casey

      Field CTO, Salesforce

    3. Photo of Matthew O'Neill

      Matthew O'Neill

      Field CTO, Salesforce

  16. The Serpent in the System: How Threat Actors Turn Legitimate Tools into Weapons

    Threat actors are increasingly using trusted, legitimate tools to hide malicious activity, with 84% of high-severity attacks now leveraging Living-off-the-Land techniques

    1. Photo of Dragos Gavrilut

      Dragos Gavrilut

      VP of Threat Research, Bitdefender

  17. Anatomy of a Service Desk Social Engineering Attack

    Understand the phases of service desk attacks and explore how organizations can strengthen defenses to prevent social engineering from becoming a gateway to compromise

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  18. How to Use a Password Audit to Improve Your Cybersecurity

    This article explains how audits strengthen cybersecurity by exposing common gaps, enabling faster remediation and enforcing stronger policies

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  19. Best Practices for Exchange Server Recovery: Minimize Downtime and Data Loss

    In this guide, Stellar explores the strategies or best practices that you can follow for successful Exchange Server recovery in case of a failure

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  20. How Enterprises Can Manage Open-Source Security When the Shift Left Meets End of Life

    Learn how DevSecOps shifts security left and right across the software lifecycle and why understanding end-of-life risks is the next frontier

    1. Photo of Artem Karasev

      Artem Karasev

      Sr. Product Marketing Manager, TuxCare

What’s Hot on Infosecurity Magazine?