Infosecurity Blogs

How Threat Actors Weaponize Your Trust

How Threat Actors Weaponize Your Trust

Trust is one of the preferred weapons of any criminals, and organizations should adapt their security with this in mind

A Smarter Cyber-Risk Management Strategy

A Smarter Cyber-Risk Management Strategy

Why you must integrate cyber-resilience into digital risk assurance programs tailored to the business

Brought to you by
LRQA

New VIP3R Campaign Highlights the Dangers of Spearphishing

New VIP3R Campaign Highlights the Dangers of Spearphishing

A unique spearphishing campaign, VIP3R, highlights the growing sophistication of these types of threats

A Practical Lesson in Collaborative Security

A Practical Lesson in Collaborative Security

Collaboration is important to mitigating risk, remediating vulnerabilities and reaching compliance

Brought to you by
ActZero

Empathy: The Overlooked Ingredient in Cybersecurity

Empathy: The Overlooked Ingredient in Cybersecurity

The cybersecurity industry needs to embrace empathy and honesty to help keep pace with cyber-threats

Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts

Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts

Worryingly, companies still rely on conventional solutions to assess bots

Brought to you by
Indusface

Tackling the Emerging Threat of Session Hijacking and MFA Bypass

Tackling the Emerging Threat of Session Hijacking and MFA Bypass

Cyber-criminals are finding ways to bypass MFA - how can organizations respond?

What Does Zero Trust Mean for MSPs?

What Does Zero Trust Mean for MSPs?

MSPs benefit from zero trust because it implies a long-term relationship with customers

Brought to you by
IS Decisions

Unraveling the Challenges of Log4j

Unraveling the Challenges of Log4j

Log4j is particularly dangerous, so what is the solution in combatting it?

Why Remote Access in Manufacturing is a Dangerous Game

Why Remote Access in Manufacturing is a Dangerous Game

Any investment in securing third-party access points is an investment in the greater good of your organization

Brought to you by
SecureLink

Celebrating a New Era for Infosecurity Europe and Cyber House Party

Celebrating a New Era for Infosecurity Europe and Cyber House Party

For the first time, Cyber House Party will be held during Infosecurity Europe, on Wednesday June 22

Protecting All Users Is What's Next for MFA

Protecting All Users Is What's Next for MFA

Truly increasing MFA adoption requires a more fundamental shift in the organization’s security posture

Brought to you by
IS Decisions

Our Bloggers

What’s Hot on Infosecurity Magazine?