Infosecurity Blogs

Five Recommendations for Smarter Security Operations

Five Recommendations for Smarter Security Operations

The impact of smarter resource allocation will continue to be a major factor for the cyber security function as the gap between supply of talent and the demand for more mature programs grows.

Fighting Account Takeovers with Cloud Intelligence

Fighting Account Takeovers with Cloud Intelligence

From a defensive point of view, examining a single transaction initiated with stolen credentials to a single web application will return an inconclusive insight, so therefore taking preventive action on that transaction becomes a risky decision.

Give Your System a Security Checkup

Give Your System a Security Checkup

You need to do a regular (preferably quarterly) cybersecurity checkup that handles every aspect of your network and system.

Fighting Account Takeovers with Cloud Intelligence

Fighting Account Takeovers with Cloud Intelligence

Visitors to highly-secured web applications create login credentials and then recycle those credentials to access another potentially vulnerable web application.

Testing Anti-Malware Support

Testing Anti-Malware Support

Product support - a less-frequently tested aspect of security.

The Cloud is the New 'Third Place', but Security Needs to Keep Pace

The Cloud is the New 'Third Place', but Security Needs to Keep Pace

If we are going to really reap the benefits of the cloud as a 'third space' its security has to be improved.

User and Entity Behavior Analytics is Just One Piece of the Insider Threat Puzzle

User and Entity Behavior Analytics is Just One Piece of the Insider Threat Puzzle

User and entity behavior analytics (UEBA) has quickly become a crowded space. CISOs are overwhelmed by vendors promising UEBA as the key to combatting insider threats when in reality it’s “a” key not “the” key.

Your Money or Your Data? Mitigating Ransomware with Dropbox

Your Money or Your Data? Mitigating Ransomware with Dropbox

Ransomware is designed to scare you into parting with money to avoid losing your data; there is no reason that either should happen. Traditional anti-virus and cloud storage services such as Dropbox form part of an effective mitigation strategy.

What Apple Vs. The FBI Can Teach Us About Cloud Storage Security

What Apple Vs. The FBI Can Teach Us About Cloud Storage Security

The recent Apple vs. FBI debate hit close to home for the cloud community because it touched on one of the industry’s hottest topics: data security.

Five Ways to Improve Security and Increase Collaboration

Five Ways to Improve Security and Increase Collaboration

With mass migration from business in brick-and-mortar to the ‘wild’ World Wide Web, there are bound to be some growing pains.

$100 Million Bank Heist Brought to Light by “Fandation”

$100 Million Bank Heist Brought to Light by “Fandation”

Financial institutions in the Middle East are deeply concerned about their cyber-presence, as cyber-attacks have escalated over a period of very short time.

Why Healthcare must Adapt Information Security to Mobile

Why Healthcare must Adapt Information Security to Mobile

In 1996, the Health Insurance Portability and Accountability Act, or HIPAA, was enacted in order to combat the rise in healthcare-related security attacks - studies uncovered that 80% of executives at healthcare providers and insurers have been hit by a cyber-attack, while the healthcare industry in general is 200% more likely to suffer from an attack than other sectors.

What’s Hot on Infosecurity Magazine?