Infosecurity Blogs

Crafting Scams with AI: a Devastating New Vector

Crafting Scams with AI: a Devastating New Vector

Powerful AI tools will soon be accessible to cyber-criminals, enabling the industrial automation of cyber-attacks

How to Backup and Restore Database in SQL Server

How to Backup and Restore Database in SQL Server

Find out why it is important to have a back up and how to create a full backup using SSMS

Brought to you by
Stellar

How Cyber-Criminals are Circumventing Multifactor Authentication

How Cyber-Criminals are Circumventing Multifactor Authentication

Cyber-criminals are exploiting MFA weaknesses, and it should no longer be seen as a 'silver bullet' against account takeover, says Adenike Cosgrove

Why You Don’t Need 300 Gbps DDoS Simulation Tests

Why You Don’t Need 300 Gbps DDoS Simulation Tests

Did you read about the 300Gbs DDoS attack last week? We must test our protection against an attack of that size

Brought to you by
Red Button

Will ChatGPT Democratize the Development of Evasive Malware?

Will ChatGPT Democratize the Development of Evasive Malware?

Menlo Security's Brett Raybould outlines the potential cyber-threats posed by ChatGPT

How to Migrate OST to Microsoft 365

How to Migrate OST to Microsoft 365

The recent Hostage Exchange Server outage is one example where the users didn’t have access to the Exchange EDB files on cloud servers and they restored mail items from the OST file

Brought to you by
Stellar

The Impact of Conversational AI on the GRC Workforce: Training our Next Generation Workers

The Impact of Conversational AI on the GRC Workforce: Training our Next Generation Workers

Jenai Marinkovic and colleagues discuss the importance of teaching cybersecurity and GRC workers how to work alongside AI systems

#IWD2023: Retaining and Advancing Women in the Cyber Security Industry: Moving from Theory to Impact by Measuring Inclusion

#IWD2023: Retaining and Advancing Women in the Cyber Security Industry: Moving from Theory to Impact by Measuring Inclusion

Women in Cybersecurity has launched a study to measure the state of inclusion of women in cybersecurity

#IWD2023: DigitALL, Innovation and Technology for Gender Equality

#IWD2023: DigitALL, Innovation and Technology for Gender Equality

One of the themes of this year's IWD is cracking the code and explores collaborative efforts towards gender equality

Looking Back at the Mega Breaches Trends of 2022

Looking Back at the Mega Breaches Trends of 2022

Paolo Passeri looks back at data on mega breaches that took place in 2022

Are You Prioritizing Digital Identity Management?

Are You Prioritizing Digital Identity Management?

Understand the measures organizations can put in place to ensure the security of their digital infrastructure and regain control over employees’ digital identities

Brought to you by
Actalis

Why Zero Trust Isn’t a Silver Bullet for Security

Why Zero Trust Isn’t a Silver Bullet for Security

It is important for organizations to recognize the limits of zero trust as they implement their security strategies

Our Bloggers

What’s Hot on Infosecurity Magazine?