Infosecurity Blogs

What Motivates Cyber-criminals and Who Are They Targeting?

What Motivates Cyber-criminals and Who Are They Targeting?

A peek into the world of cyber-criminals, what motivates them and who they are targeting.

Fear of the Unknown – How to Survive

Fear of the Unknown – How to Survive

While the average employee might not understand something as sophisticated as software defined networking, they likely understand the function of the network and have a general understanding of the cloud.

Five Cybersecurity Questions Every Executive Should Ask

Five Cybersecurity Questions Every Executive Should Ask

Executives should regularly ask five questions of those responsible for cybersecurity concerning the level of cyber-risk their organization is carrying.

The Rise and Rise of Public Cloud Services

Cloud enthusiastic digital natives are now gaining business management positions, whilst shadow IT is becoming an accepted norm. The choice IT departments face is no longer whether or not to adopt cloud-based services, but about the security that is put in place to support their use.

Blue Coat, from Surf Control to Riding the Security Wave

Blue Coat, from Surf Control to Riding the Security Wave

Over the last 20 years Blue Coat has grown from a niche player in the network performance to stand alongside the giants of IT security. This has mainly been achieved through a long series of acquisitions—more will likely follow.

‘Flipping the Economics of Attacks’ – A Report

‘Flipping the Economics of Attacks’ – A Report

What does this new report teach us about cyber-criminals and how to stop them?

Accepting the Unknown Risk

Accepting the Unknown Risk

Host Unknown return from a musical hiatus to their CISSP video, to rap about risk acceptance.

Bug Bounties and Crowdsourcing Security

Bug Bounties and Crowdsourcing Security

Are Bug Bounty programs effective at fixing vulnerabilities or simply crowdsourced security?

Review: 'The Power of Privacy'

Review: 'The Power of Privacy'

The Guardian and US-tech company Silent Circle release documentary exploring digital security.

Where There's a Will

Where There's a Will

Inheriting IT hardware: when it comes to access software and services, legality and authentication can be complicated.

It Shouldn't Matter how Many USBs are Lost

It Shouldn't Matter how Many USBs are Lost

The proliferation of data loss stories in the media proves that the problem of human error, or indeed, human nature, isn't going anywhere.

A Year in Vendor Patching: Does an Increase in Patches Mean we are More or Less Secure?

A Year in Vendor Patching: Does an Increase in Patches Mean we are More or Less Secure?

Why was 2015 such an insecure year for vendors and why did cyber-threats see a marked increase?

What’s Hot on Infosecurity Magazine?