Infosecurity Blogs

On the First Day of Christmas, the Industry Predicted...MORE RANSOMWARE

On the First Day of Christmas, the Industry Predicted...MORE RANSOMWARE

As 2016 draws to a close, what lessons can be drawn from a year that was immersed in cybersecurity controversy and headline-making news, and what predictions can be made about what we expect to face in 2017?

Trading in Compromised Remote Desktop Services

Trading in Compromised Remote Desktop Services

There is a criminal underworld of compromised services in existence on dark web forums

‘We'll Always Have Paris’ – Highlights from ISSE Conference 2016

‘We'll Always Have Paris’ – Highlights from ISSE Conference 2016

This week the beautiful city of Paris played host to the 17th annual ISSE Conference, bringing together a raft of security professionals and experts from around the world to discuss, debate and shape the future of digital identity

Closing the Gender Gap in Cybersecurity: Its Time to Back Ourselves as an Industry

Closing the Gender Gap in Cybersecurity: Its Time to Back Ourselves as an Industry

Cybersecurity is facing a frightening skills gap, so to put it simply, we need more people, so we need more women

Assessing the Cost of Brexit from a Cybersecurity Standpoint

Assessing the Cost of Brexit from a Cybersecurity Standpoint

The cybersecurity community is equally looking to assess the impact of Brexit

5 Common Mistakes When Dealing with Security Stakeholders – and How to Avoid Them

5 Common Mistakes When Dealing with Security Stakeholders – and How to Avoid Them

Managing an initiative as business-critical as cybersecurity means IT and security leaders need to work closely with various stakeholders to agree to the security strategy, put them at ease that it will work and give them confidence that it will be effective

Everything You Need to Know About RDNH

Everything You Need to Know About RDNH

Every business needs to take great care with its domain name. This is the word or words you choose to form your website address, literally your identity on the world wide web

The Pitfalls of Awareness

The Pitfalls of Awareness

Dr Jessica Barker reveals the three pitfalls of security awareness

#FutureDecoded Dreaming of Electric Employees

#FutureDecoded Dreaming of Electric Employees

If you believed that terms such as artificial intelligence (AI), machine learning and digital transformation were the stuff of science fiction, then other sections of IT are proving that this is the new reality.

Mirai - How a Botnet Made IoT a Security Reality

Mirai - How a Botnet Made IoT a Security Reality

I’ve been hearing about IoT for a number of years, and it was not until 2013 until I understood what the concept was about, and sometime after that the term was more defined as the concept of connected devices became more of a reality.

International Cybersecurity Regulation Needs to Become Standard

International Cybersecurity Regulation Needs to Become Standard

Harshul Joshi, DarkMatter, explains why international cybersecurity regulation needs to become the standard now

Roundtable: Former Deputy Director of NSA Talks Insider Threats

Roundtable: Former Deputy Director of NSA Talks Insider Threats

Chris Inglis discusses the insider threat talking his experiences with the NSA, transparency and the use of behavior analytics

What’s Hot on Infosecurity Magazine?