Infosecurity Blogs

  1. When Should Enterprises Use Application Security or Application Security Posture Management?

    Explore the differences between AppSec and ASPM, and how enterprises can choose between them

    1. Photo of Seemant  Sehgal

      Seemant Sehgal

      Founder & CEO, BreachLock

  2. DDoS Attacks: It’s What You Don’t Know That May Hurt You

    Despite having DDoS protection, organizations often lack confidence in their defenses due to a lack of testing, which reveals vulnerabilities and helps refine response strategies

    1. Photo of Ziv Gadot

      Ziv Gadot

      CEO, Red Button

  3. Tech Predictions for 2025’s Frontline Workforce: Secure, Simplify, Optimize

    To optimize cybersecurity investments and prepare workforces for evolving demands, organizations will focus on simplifying current approaches to security through identity and access innovations

    1. Photo of Joel Burleson-Davis

      Joel Burleson-Davis

      SVP Worldwide Engineering, Cyber, Imprivata

  4. The New Cyber Frontier: Managing Risks in Distributed Teams

    Remote work has revolutionized how we collaborate, but what’s the cost of this convenience?

    1. Photo of Saba  Hasan

      Saba Hasan

      Senior Executive, PureVPN

  5. UK Government Invites Industry to Get Behind new UK Cyber Team

    The UK Government, in partnership with SANS Institute, has launched a nationwide competition to find young cybersecurity talent in a Capture-the-Flag style series of gruelling challenges

  6. Why Cybersecurity is Critical in IoT Development Services for a Safer Connected World

    Explore the critical role of cybersecurity in IoT development, the unique challenges IoT poses, and best practices for creating secure IoT solutions

  7. [Fixed]: SQL Server Errors 823, 824, and 825 due to Page Corruption

    Understand common causes behind corruption in pages and the methods to resolve the SQL Server errors 823, 824, and 825

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  8. NIS2 Directive: Everything EU Member States and Organizations Need to Know to Prepare and Comply

    Understand how NIS2 requirements will affect those mandated industries, and what security providers can do to help them prepare and comply

    1. Photo of Seemant  Sehgal

      Seemant Sehgal

      Founder & CEO, BreachLock

  9. It’s a Hard Time to Be a CISO. Transformational Leadership Is More Important Than Ever

    By adopting a transformational leadership approach, CISOs can take proactive steps to protect their organization (and themselves) from the ripple effects of an accelerating threat landscape

    1. Photo of Frank Kim

      Frank Kim

      SANS Fellow, SANS Institute

  10. Protecting Customer Data with AI Powered CIAM and IGA

    AI-powered strategies can help companies protect customer data, reduce breach risks, and maintain regulatory compliance, fostering trust in the digital age

    1. Photo of Bruce Esposito

      Bruce Esposito

      Product Marketing IGA, One Identity

  11. The State of Cybersecurity: Challenges, Priorities and Insights

    ISACA's Adham Etoom highlights key findings from ISACA's 2024 State of Cybersecurity report, including rising stress levels, skills shortages and budgetary constraints

    1. Photo of Adham Etoom

      Adham Etoom

      Cybersecurity Advisor, Program Manager

  12. Balancing Clients' Security and Functionality in the Cloud

    To ensure the security status of CIS Hardened Images, CIS conducted testing with Azure Monitor Agent and Azure Update Manager, and this blog will discuss the significance, findings, and future plans of this initiative

    1. Photo of Mia Lavada

      Mia Lavada

      Product Manager, Center for Internet Security

  13. The Key Components For a Secure Password Policy (And Why Complexity Isn’t One)

    Learn about the key components for a secure password policy and find out why complexity isn't one of them

    1. Photo of Darren  James

      Darren James

      Senior Product Manager, Specops Software – An Outpost24 Company

  14. What is the NIS2 Directive and Why Now?

    Explore the origins of NIS2 and its key updates

    1. Photo of Seemant  Sehgal

      Seemant Sehgal

      Founder & CEO, BreachLock

  15. FIDO's Frontier: Paving the Way for a Passwordless Future

    FIDO's potential to revolutionize passwordless authentication depends on its ability to achieve widespread adoption through interoperability and cross-platform functionality

    1. Photo of Chris Collier

      Chris Collier

      Identity & Access Management Technologist, Swissbit

  16. Incorporating CSPM within IaaS Strategies for Client Success

    Cloud-based platforms are becoming increasingly popular for managing business operations, leading to a growing demand for MSPs, MSSPs, and IT consultants to implement IaaS strategies while mitigating risks through CSPM integration

    1. Photo of Mia Lavada

      Mia Lavada

      Product Manager, Center for Internet Security

  17. How to Recreate Exchange Database from Scratch

    Understand how to recreated and exchange database from scratch

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  18. #CyberMonth: The Importance of Identity and Access Management in Safeguarding Your Enterprise

    IAM leaders are increasingly vital to cybersecurity, and their roles are expanding as they leverage AI and PAM strategies to protect organizations' digital identities and drive business success

  19. In Rust We Trust: What’s the Story with Developers’ Most Beloved Language?

    Rust's growing popularity is fueled by its unique combination of performance, memory safety, and developer satisfaction

    1. Photo of Yehuda Gelb

      Yehuda Gelb

      Senior Security Researcher, Checkmarx

  20. Enhancing Cloud Security: Securing Windows and Linux Operating Systems with CIS Hardened Images

    The movement towards cloud computing offers countless benefits such as business scalability and cost optimization, but it also presents a security risk often overlooked

    1. Photo of Mia Lavada

      Mia Lavada

      Product Manager, Center for Internet Security

What’s hot on Infosecurity Magazine?