Infosecurity Blogs

Threat Intelligence - The Answer to Threats or Another Fad?

Threat Intelligence - The Answer to Threats or Another Fad?

The threat landscape has been dynamic and ever changing, and the growth and rapid advancement in cyber-attacks against enterprises and individuals have rendered traditional cyber-security measures virtually obsolete.

The Overlooked Elements of InfoSec: Solving the Unknown Unknowns

The Overlooked Elements of InfoSec: Solving the Unknown Unknowns

If there’s a golden rule around InfoSec, it probably amounts to “you have to know what exists on your network to effectively protect it.”

How Information Resilience can Help Businesses Secure Their Place in Tomorrow’s Supply Chain

How Information Resilience can Help Businesses Secure Their Place in Tomorrow’s Supply Chain

The proper protection of a business’ digital information is a growing concern, and one that must be addressed to ensure the long-term prosperity of an organization.

Why Preventing Rooting and Jailbreaking is so Important

Why Preventing Rooting and Jailbreaking is so Important

Although rooting and jailbreaking are technically different processes on different platforms, the end-goal is the same.

Why Employees Are Taxing Your Cyber Security Team’s Patience

Why Employees Are Taxing Your Cyber Security Team’s Patience

Tax season shouldn’t put an undue burden on the IT team.

IT Untethered – How Wireless is Changing the World

IT Untethered – How Wireless is Changing the World

Wi-Fi started out as way to make local area networks easier to deploy. Now, coupled with cellular networks, the rise ubiquitous mobility and the IoT, wireless is changing the world and there are security issues to consider.

Securing the Connected Organization

Securing the Connected Organization

Victoria Windsor, Content Manager for Infosecurity Europe, looks at the challenges businesses face to secure their connected enterprise in 2016

Why Data Leaks Will Continue to Happen

Why Data Leaks Will Continue to Happen

The release of sensitive information to the public by individuals who are sometimes called whistleblowers and dubbed traitor or hero, is termed to be a data leak.

How to Run Effective Phishing Assessment and Training Campaigns Employees Don’t Hate

How to Run Effective Phishing Assessment and Training Campaigns Employees Don’t Hate

The 11 best ways to conduct a successful phishing assessment process.

#MayThe4thBeWithYou : The Insider Threat Awakens

#MayThe4thBeWithYou : The Insider Threat Awakens

Spoiler alert: If you are one of the few people in the galaxy who haven’t seen the movie yet, you may want to hold off on reading this.

We Cannot Fight DDoS Attacks With Our Eyes Closed

We Cannot Fight DDoS Attacks With Our Eyes Closed

When dealing with a DDoS attack, it can be challenging to determine whether your website is down due to legitimate traffic volumes or because of an attack. Unfortunately, businesses are unable to simply check to see if all the traffic is coming from one IP address because of the nature of DDoS attacks whereby traffic comes from multiple sources.

Five Recommendations for Smarter Security Operations

Five Recommendations for Smarter Security Operations

The impact of smarter resource allocation will continue to be a major factor for the cyber security function as the gap between supply of talent and the demand for more mature programs grows.

What’s Hot on Infosecurity Magazine?