Infosecurity Blogs

Credential Stuffing: the Culprit of Recent Attacks

Credential Stuffing: the Culprit of Recent Attacks

Credential stuffing attacks use stolen usernames and password combinations

Brought to you by
Specops

IR Planning – It Is Not Optional!

IR Planning – It Is Not Optional!

Understanding what to do when an incident occurs and who to talk to is critical to ensuring there is an effective response

Double Extortion Ransomware Attacks and the Role of Vulnerable Internet-Facing Systems

Double Extortion Ransomware Attacks and the Role of Vulnerable Internet-Facing Systems

Ransomware attacks are adopting an approach defined as “double extortion"

Cyberwarfare: the New Frontier of Wars Between Countries

Cyberwarfare: the New Frontier of Wars Between Countries

Cyberwarfare can be launched instantly, making it difficult to counter

Brought to you by
Indusface

A New Path for Data Protection

A New Path for Data Protection

Any organization that is dealing with large amounts of unstructured data should strongly consider microsharding

Using Self-Service Password Reset Tools to Support Remote Workers

Using Self-Service Password Reset Tools to Support Remote Workers

Password resets have always been problematic for helpdesks

Brought to you by
Specops

Focus on Continuous Learning, Not Passing Exams

Focus on Continuous Learning, Not Passing Exams

Continuous learning is done by teaching humans to think for themselves and be creative

Stop the Cyber-Attack Cycle with Privileged Access Management

Stop the Cyber-Attack Cycle with Privileged Access Management

Securing privileged access helps shrink the attack surface

Brought to you by
CyberArk

Is the Security Department a Barrier for Progression or are they Misunderstood?

Is the Security Department a Barrier for Progression or are they Misunderstood?

Is the security team, "The Department of No?"

Distributed Working Demands New Levels of Data Security at the Edge

Distributed Working Demands New Levels of Data Security at the Edge

Lockdowns and quarantines have rapidly changed how organisations of all sizes operate

Brought to you by
Voxility

Migrating On-Premises Email to Office 365: Limitations, Prerequisites and Best Practices

Migrating On-Premises Email to Office 365: Limitations, Prerequisites and Best Practices

The critical considerations for migrating an on-premises email organization to Office 365

Brought to you by
Stellar

Is it Finally the End of Adobe Flash Player?

Is it Finally the End of Adobe Flash Player?

With the end of support just a few months away, is it finally the end of the road for this buggy plug-in?

Our Bloggers

What’s Hot on Infosecurity Magazine?