Infosecurity Blogs

  1. Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments

    Misalignment between InfoSec and SaaS teams creates an "InfoSec↔SaaS Divide," leading to delays and risk exposure. Bridging this operational gap is vital for securing SaaS data and unlocking the future benefits of agentic AI

    1. Photo of Carl  Brundage

      Carl Brundage

      Technical Architect, Salesforce

    2. Photo of Dr. Eoghan  Casey

      Dr. Eoghan Casey

      Field CTO, Salesforce

    3. Photo of Matthew O'Neill

      Matthew O'Neill

      Field CTO, Salesforce

  2. The Serpent in the System: How Threat Actors Turn Legitimate Tools into Weapons

    Threat actors are increasingly using trusted, legitimate tools to hide malicious activity, with 84% of high-severity attacks now leveraging Living-off-the-Land techniques

    1. Photo of Dragos Gavrilut

      Dragos Gavrilut

      VP of Threat Research, Bitdefender

  3. Anatomy of a Service Desk Social Engineering Attack

    Understand the phases of service desk attacks and explore how organizations can strengthen defenses to prevent social engineering from becoming a gateway to compromise

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  4. How to Use a Password Audit to Improve Your Cybersecurity

    This article explains how audits strengthen cybersecurity by exposing common gaps, enabling faster remediation and enforcing stronger policies

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  5. Best Practices for Exchange Server Recovery: Minimize Downtime and Data Loss

    In this guide, Stellar explores the strategies or best practices that you can follow for successful Exchange Server recovery in case of a failure

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  6. How Enterprises Can Manage Open-Source Security When the Shift Left Meets End of Life

    Learn how DevSecOps shifts security left and right across the software lifecycle and why understanding end-of-life risks is the next frontier

    1. Photo of Artem Karasev

      Artem Karasev

      Sr. Product Marketing Manager, TuxCare

  7. Identity Risk Management: Locking Down Ephemeral Accounts

    Explore the hidden risks of ephemeral accounts and discover how just-in-time (JIT) privilege elevation can enhance security without compromising operational efficiency

    1. Photo of Richard  Hosgood

      Richard Hosgood

      PAM Principal Presales Engineer, North America, One Identity

  8. Why Use a Hardware Wallet Instead of an Exchange for Cryptocurrency Security?

    As interest in cryptocurrencies grows, using a hardware wallet is emerging as the most secure way to manage digital assets compared to storing them on exchanges

  9. GDPR Password Management: Ensuring Compliance with Passwork

    This article by Passwork explores the complexities of GDPR-compliant password management, balancing security requirements, usability and the challenges posed by human behavior

    1. Eirik Salmi

      Security Analyst, Passwork

  10. How to Restore Exchange Mailbox

    Discover how native methods to restore soft-deleted and hard-deleted mailboxes work and learn how third-party tools like Stellar Repair for Exchange can overcome their limitations efficiently and safely

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  11. Why 100% of CEH Professionals Would Recommend the Certification to Their Peers: Insights from the CEH HOF 2025 Industry Report

    According to the CEH Hall of Fame 2025 Industry Report , 100% of CEH Hall of Fame inductees attribute their career success and enhanced workplace recognition to the Certified Ethical Hacker (CEH) certification

  12. How Simple IAM Control Could Have Prevented Major Cyber-Attacks

    Why self-service password reset with MFA is more than just a convenience – it’s a critical layer of defense

    1. Photo of Donnie  Batz

      Donnie Batz

      Senior Sales Engineer, One Identity

  13. How Worried Should Consumers Really Be After a Data Breach?

    Specops discuss the action consumers should take when they receive a data breach notification

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  14. Identity Theft Isn’t a Hacking Problem, It’s a Data Problem - Here’s How to Fix It

    Identity theft is primarily a data problem, not just a hacking issue, as thieves exploit readily available personal information. Protecting yourself involves removing information from data brokers, being selective about online sharing, and monitoring accounts. Proactive data exposure management is crucial for identity protection

    1. Photo of Mariam  Volobueva

      Mariam Volobueva

      Lead Copywriter, Incogni

  15. Don’t Act in Isolation: Transforming Malware Intelligence in the AI Era

    As cybercriminals use AI to boost the scale and sophistication of malware attacks, Justin Grosfelt, Manager of the Reversing, Emulation, and Testing (RET) Team, Insikt Group, Recorded Future, looks at how defenses must evolve to stay ahead of a new era of threats

    1. Photo of Justin  Grosfelt

      Justin Grosfelt

      Manager of the Reversing, Emulation, and Testing (RET) Team, Insikt Group, Recorded Future

  16. How to Recover My Archived PST Files in Outlook

    Learn how to recover archived PST files in classic Outlook and new Outlook

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  17. Why One-Off Pen Tests Could Be Leaving You at Risk

    Annual penetration test only provides security validation for a single moment in time and might lead to undiscovered vulnerabilities. Could combining in-depth penetration tests with continuous monitoring on the other hand, help alleviate this issue?

    1. Photo of Patrick Lehnis

      Patrick Lehnis

      Marketing Manager, Outpost24

  18. Predicting Primes: Is This Discovery a Problem for Encryption?

    New research claims prime numbers can now be predicted, potentially weakening encryption methods like RSA. While this poses risks to cybersecurity, it also opens doors to more efficient cryptographic systems

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  19. How Does EASM Go Beyond Vulnerability Management?

    This article explores external attack surface management and how it extends beyond traditional vulnerability management to give organizations a more complete view of their security gaps and vulnerabilities

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  20. Low Effort, High Reward: How Nailing Basic Cyber Hygiene Makes an Organization Stronger in the Age of the ‘Novel’ Attack Vector

    This article argues that by prioritizing cyber hygiene—patching systems, training staff, and consolidating tools—organizations can build stronger defenses and free up resources to tackle more sophisticated threats when they do arise

    1. Photo of Mark Weir

      Mark Weir

      Regional Director, UK & Ireland, Check Point Software

What’s Hot on Infosecurity Magazine?