Infosecurity Blogs

  1. How to Fix OST File cannot be Opened Error

    In this article, Stellar highlights the possible causes behind this Outlook data file error and explain the troubleshooting methods to fix it

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  2. Elevating SaaS Security with NIST CSF and Agentic AI

    How do we strike the right balance between rapid innovation and maintaining airtight security in a SaaS-first, AI-driven landscape?

    1. Photo of Carl  Brundage

      Carl Brundage

      Technical Architect, Salesforce

    2. Photo of Dr. Eoghan  Casey

      Dr. Eoghan Casey

      Field CTO, Salesforce

    3. Photo of Matthew O'Neill

      Matthew O'Neill

      Field CTO, Salesforce

  3. Preparing for the Quantum Future: Lessons from Singapore

    As quantum computing advances, so is the race to secure our systems before “Q-day” when quantum machines can break today’s encryption. At GovWare 2025, Singapore’s role as a global testbed for quantum-safe innovation was highlighted, with insights from an expert at global technology, defense and engineering group ST Engineering

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  4. Passwords, MFA and AD Accounts: Hardening Your Environment for NIS2 Compliance

    In this article, learn how CISOs can strengthen Active Directory, enforce strong password policies and implement MFA to achieve NIS2 compliance

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  5. Ensuring Backup Compliance with SOC 2 and ISO 27001

    Learn how to make your backups fully compliant with SOC 2 Criteria and ISO 27001 Controls and pass an audit or certification

    1. Photo of Łukasz Dydek

      Łukasz Dydek

      Xopero Software / Gitprotect.io

  6. Beyond The Password Security Checkbox: Why Compliance Isn't Enough

    Compliance frameworks set essential cybersecurity standards, but checking boxes is not enough to prevent breaches. Continuous security requires proactive threat detection, breached password monitoring, and adaptive password policies that protect high-risk accounts. Specops Password Policy strengthens Active Directory defenses by bridging the gap between compliance, password security and real protection

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  7. Resilience At Risk: Talent and Governance in the Age of AI

    The cybersecurity talent gap is now a strategic risk, threatening national security, AI safety and enterprise resilience. Tech alone can't defend, skilled humans are essential to interpret threats and enforce accountability

    1. Photo of Adham Etoom

      Adham Etoom

      Cybersecurity Advisor, Program Manager

    2. Photo of Isheanesu  Sithole

      Isheanesu Sithole

      Past President of the ISACA Harare Chapter, ISACA

  8. SaaS Rolls Forward, Not Backward: Strategies to Prevent Data Loss and Downtime

    This article helps bridge the divide by showing how SaaS fundamentally changes Business Continuity and Disaster Recovery planning and data repair, particularly in the era of agentic AI

    1. Photo of Carl  Brundage

      Carl Brundage

      Technical Architect, Salesforce

    2. Photo of Dr. Eoghan  Casey

      Dr. Eoghan Casey

      Field CTO, Salesforce

    3. Photo of Matthew O'Neill

      Matthew O'Neill

      Field CTO, Salesforce

  9. Best Practices for SAP Identity Framework Migration

    Explore the impact of SAP IdM and GRC end-of-life by 2027 and discover key considerations for migrating to new identity and governance solutions

    1. Photo of Abdullah Ahmad

      Abdullah Ahmad

      Senior Solutions Architect, One Identity

  10. Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments

    Misalignment between InfoSec and SaaS teams creates an "InfoSec↔SaaS Divide," leading to delays and risk exposure. Bridging this operational gap is vital for securing SaaS data and unlocking the future benefits of agentic AI

    1. Photo of Carl  Brundage

      Carl Brundage

      Technical Architect, Salesforce

    2. Photo of Dr. Eoghan  Casey

      Dr. Eoghan Casey

      Field CTO, Salesforce

    3. Photo of Matthew O'Neill

      Matthew O'Neill

      Field CTO, Salesforce

  11. The Serpent in the System: How Threat Actors Turn Legitimate Tools into Weapons

    Threat actors are increasingly using trusted, legitimate tools to hide malicious activity, with 84% of high-severity attacks now leveraging Living-off-the-Land techniques

    1. Photo of Dragos Gavrilut

      Dragos Gavrilut

      VP of Threat Research, Bitdefender

  12. Anatomy of a Service Desk Social Engineering Attack

    Understand the phases of service desk attacks and explore how organizations can strengthen defenses to prevent social engineering from becoming a gateway to compromise

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  13. How to Use a Password Audit to Improve Your Cybersecurity

    This article explains how audits strengthen cybersecurity by exposing common gaps, enabling faster remediation and enforcing stronger policies

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  14. Best Practices for Exchange Server Recovery: Minimize Downtime and Data Loss

    In this guide, Stellar explores the strategies or best practices that you can follow for successful Exchange Server recovery in case of a failure

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  15. How Enterprises Can Manage Open-Source Security When the Shift Left Meets End of Life

    Learn how DevSecOps shifts security left and right across the software lifecycle and why understanding end-of-life risks is the next frontier

    1. Photo of Artem Karasev

      Artem Karasev

      Sr. Product Marketing Manager, TuxCare

  16. Identity Risk Management: Locking Down Ephemeral Accounts

    Explore the hidden risks of ephemeral accounts and discover how just-in-time (JIT) privilege elevation can enhance security without compromising operational efficiency

    1. Photo of Richard  Hosgood

      Richard Hosgood

      PAM Principal Presales Engineer, North America, One Identity

  17. Why Use a Hardware Wallet Instead of an Exchange for Cryptocurrency Security?

    As interest in cryptocurrencies grows, using a hardware wallet is emerging as the most secure way to manage digital assets compared to storing them on exchanges

  18. GDPR Password Management: Ensuring Compliance with Passwork

    This article by Passwork explores the complexities of GDPR-compliant password management, balancing security requirements, usability and the challenges posed by human behavior

    1. Eirik Salmi

      Security Analyst, Passwork

  19. How to Restore Exchange Mailbox

    Discover how native methods to restore soft-deleted and hard-deleted mailboxes work and learn how third-party tools like Stellar Repair for Exchange can overcome their limitations efficiently and safely

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  20. Why 100% of CEH Professionals Would Recommend the Certification to Their Peers: Insights from the CEH HOF 2025 Industry Report

    According to the CEH Hall of Fame 2025 Industry Report , 100% of CEH Hall of Fame inductees attribute their career success and enhanced workplace recognition to the Certified Ethical Hacker (CEH) certification

What’s Hot on Infosecurity Magazine?