Infosecurity Blogs

Love Is in the Air, and So Are Security Threats

Love Is in the Air, and So Are Security Threats

It may be the most romantic day of the year but that hasn’t lessened any of the security risks for online shoppers and dating app users.

The ‘Human’ Side of Cybersecurity

The ‘Human’ Side of Cybersecurity

Arm your people with security knowledge, and you'll see the benefits.

Cyber Security Training and Certifications have Expanded Rapidly, Where Should you Focus?

Cyber Security Training and Certifications have Expanded Rapidly, Where Should you Focus?

Cybersecurity training courses and certifications have exploded in popularity over the last five years.

Error 53 is “for your own good" says Apple. Experts disagree

Error 53 is “for your own good" says Apple. Experts disagree

The issue is being called the "Error 53" problem, and so far there's no fix.

What Motivates Cyber-criminals and Who Are They Targeting?

What Motivates Cyber-criminals and Who Are They Targeting?

A peek into the world of cyber-criminals, what motivates them and who they are targeting.

Fear of the Unknown – How to Survive

Fear of the Unknown – How to Survive

While the average employee might not understand something as sophisticated as software defined networking, they likely understand the function of the network and have a general understanding of the cloud.

Five Cybersecurity Questions Every Executive Should Ask

Five Cybersecurity Questions Every Executive Should Ask

Executives should regularly ask five questions of those responsible for cybersecurity concerning the level of cyber-risk their organization is carrying.

The Rise and Rise of Public Cloud Services

Cloud enthusiastic digital natives are now gaining business management positions, whilst shadow IT is becoming an accepted norm. The choice IT departments face is no longer whether or not to adopt cloud-based services, but about the security that is put in place to support their use.

Blue Coat, from Surf Control to Riding the Security Wave

Blue Coat, from Surf Control to Riding the Security Wave

Over the last 20 years Blue Coat has grown from a niche player in the network performance to stand alongside the giants of IT security. This has mainly been achieved through a long series of acquisitions—more will likely follow.

‘Flipping the Economics of Attacks’ – A Report

‘Flipping the Economics of Attacks’ – A Report

What does this new report teach us about cyber-criminals and how to stop them?

Accepting the Unknown Risk

Accepting the Unknown Risk

Host Unknown return from a musical hiatus to their CISSP video, to rap about risk acceptance.

Bug Bounties and Crowdsourcing Security

Bug Bounties and Crowdsourcing Security

Are Bug Bounty programs effective at fixing vulnerabilities or simply crowdsourced security?

What’s Hot on Infosecurity Magazine?