Infosecurity Blogs

On the Fifth Day of Christmas, the Industry Predicted…More Social Media Attacks

On the Fifth Day of Christmas, the Industry Predicted…More Social Media Attacks

Social media and networking sites will be prime attack targets in 2017, each carrying its own set of risks

Dridex Targets Scotland

Dridex Targets Scotland

Dridex recently targeted victims using a football lure in an attempt to deliver the malicious trojan

On the Fourth Day of Christmas, the Industry Predicted…CIOs to Reclaim Ownership of Data Initiatives

On the Fourth Day of Christmas, the Industry Predicted…CIOs to Reclaim Ownership of Data Initiatives

2017 could be the year in which CIOs will secure their future by reclaiming ownership of data initiatives

On the Third Day of Christmas, the Industry Predicted…More Political Disruption

On the Third Day of Christmas, the Industry Predicted…More Political Disruption

Experts warn nation states and their sponsored operatives will use cyber espionage more and more next year to cause political shifts, disruption and to gain economic advantage

On the Second Day of Christmas, the Industry Predicted…Poor Routine IT Practices

On the Second Day of Christmas, the Industry Predicted…Poor Routine IT Practices

Poor routine IT practices will cause the most avoidable harm to businesses next year

On the First Day of Christmas, the Industry Predicted...MORE RANSOMWARE

On the First Day of Christmas, the Industry Predicted...MORE RANSOMWARE

As 2016 draws to a close, what lessons can be drawn from a year that was immersed in cybersecurity controversy and headline-making news, and what predictions can be made about what we expect to face in 2017?

Trading in Compromised Remote Desktop Services

Trading in Compromised Remote Desktop Services

There is a criminal underworld of compromised services in existence on dark web forums

‘We'll Always Have Paris’ – Highlights from ISSE Conference 2016

‘We'll Always Have Paris’ – Highlights from ISSE Conference 2016

This week the beautiful city of Paris played host to the 17th annual ISSE Conference, bringing together a raft of security professionals and experts from around the world to discuss, debate and shape the future of digital identity

Closing the Gender Gap in Cybersecurity: Its Time to Back Ourselves as an Industry

Closing the Gender Gap in Cybersecurity: Its Time to Back Ourselves as an Industry

Cybersecurity is facing a frightening skills gap, so to put it simply, we need more people, so we need more women

Assessing the Cost of Brexit from a Cybersecurity Standpoint

Assessing the Cost of Brexit from a Cybersecurity Standpoint

The cybersecurity community is equally looking to assess the impact of Brexit

5 Common Mistakes When Dealing with Security Stakeholders – and How to Avoid Them

5 Common Mistakes When Dealing with Security Stakeholders – and How to Avoid Them

Managing an initiative as business-critical as cybersecurity means IT and security leaders need to work closely with various stakeholders to agree to the security strategy, put them at ease that it will work and give them confidence that it will be effective

Everything You Need to Know About RDNH

Everything You Need to Know About RDNH

Every business needs to take great care with its domain name. This is the word or words you choose to form your website address, literally your identity on the world wide web

What’s Hot on Infosecurity Magazine?