Infosecurity Blogs

A Day in the Life of an IT Pro: Hacked off with IoT

A Day in the Life of an IT Pro: Hacked off with IoT

I know the topic of connected fridges and the like is often covered, but amid the cacophony of excited consumers is a warning – the impact of IoT on enterprise security could be monumental.

SentinelOne Financially Guarantees Ransomware Recovery

SentinelOne Financially Guarantees Ransomware Recovery

Endpoint security vendor SentinelOne has announced a cyber-threat “protection guarantee” that will provide customers with financial protection in the event of ransomware attacks on their networks

Why IT Service Desk Should be your First Line of Defence

Why IT Service Desk Should be your First Line of Defence

In a world of zero day vulnerabilities and advanced persistent threats, it is the Service Desk, coupled with a layered approach of patch management and application control, which must provide a vital first line of defense against industrial hackers.

Ransomware Holds Your Data Hostage. Here’s How to Stop It

Ransomware Holds Your Data Hostage. Here’s How to Stop It

Finding yourself in a situation where your data is held hostage can be an intensely frustrating experience for individuals and businesses.

Steelcon - When Hackers Went North

Steelcon - When Hackers Went North

Describing itself as a hacker con “with a northern edge”, the conference welcomed some leading lights from the UK information security scene and after seeing its growth and an impressive 2015 from afar, I was able to grab a ticket and get along to it

Will Linking Executive Pay to Cybersecurity be the Wake-Up Call CEOs Need?

Will Linking Executive Pay to Cybersecurity be the Wake-Up Call CEOs Need?

CEOs who don’t work in the telecoms or IT sectors may not have paid much attention to the Culture, Media and Sport Committee’s investigation into cybersecurity, which was triggered by last October’s cyber-attack on TalkTalk. That might be a mistake.

Banking on Security

Banking on Security

The financial services industry is evolving at a rapid rate. From shifting customer expectations to disruptive technology, it has had to redefine itself and now leads by shining example as a sector that is an expert at digital.

Cybersecurity - A Boardroom Blindspot

Cybersecurity - A Boardroom Blindspot

Is cybersecurity on the agenda in your boardroom? In the most recent Cyber Governance Health Check it was found that 33% of boards have ‘clearly set and understood their appetite for cyber-risk’, up 18% from 2014.

OASIS Summer Event: Red Teaming, Scorecarding and Endpoint Security

OASIS Summer Event: Red Teaming, Scorecarding and Endpoint Security

This week the stylish venue of Ham Yard Hotel played host to the summer edition of the OASIS event, bringing together industry specialists to discuss and share their thoughts on some of the main talking points across the cybersecurity sector at the moment

Betrayed By Your Biggest Fan

Betrayed By Your Biggest Fan

Fansmitter malware is designed to acoustically exfiltrate sensitive information across air-gapped system.

Millennials and Their Impact on Security

Millennials and Their Impact on Security

While it's brilliant that millennials are digital natives and as such insanely clever about technology, this is juxtaposed with a blatant disregard for the security of that technology.

Inside Threats, Compound Solutions

Inside Threats, Compound Solutions

Organizations must update and enforce technological policies that include usage logging and tightly controlling those who have elevated “admin rights”. In many cases, this is all easier said than done, so outsourcing to specialists is often the smarter path to take. Even if you are Jack Bauer.

What’s Hot on Infosecurity Magazine?