Infosecurity Blogs

Continuous Learning is the Only Path to the Next 50 Years in Technology

Continuous Learning is the Only Path to the Next 50 Years in Technology

How technology has evolved since the foundation of ISACA 50 years ago, and what the next half century could look like.

Cybersecurity: Billions Pour In, Basics Languish

Cybersecurity: Billions Pour In, Basics Languish

2018’s headlines only underscored the need for robust data security with over 2 billion records stolen.

How to Get Cybersecurity Right in 2019

How to Get Cybersecurity Right in 2019

Cybercrime losses continue to go up, but spending does not match the figures. What needs to be changed to balance the numbers out?

2019 Predictions: Part Three

2019 Predictions: Part Three

As 2018 draws to a close, the industry turns its thoughts to next year and preparing for the trends, threats and challenges that 2019 might have in store

Time: An Attacker’s Best Friend

Time: An Attacker’s Best Friend

Analysis of the 'staggering' breach at Marriott, and what made the attack unique.

2019 Predictions: Part Two

2019 Predictions: Part Two

As 2018 draws to a close, the industry turns its thoughts to next year and preparing for the trends, threats and challenges that 2019 might have in store

2019 Predictions: Part One

2019 Predictions: Part One

As 2018 draws to a close, the industry turns its thoughts to next year and preparing for the trends, threats and challenges that 2019 might have in store

The TrickBot and MikroTik Connection – A Story of Investment and Collaboration

The TrickBot and MikroTik Connection – A Story of Investment and Collaboration

The increasing involvement of MikroTik hosts in malicious activity.

Are Lawyers the Best Judge of Cybersecurity?

Are Lawyers the Best Judge of Cybersecurity?

It's not just lawmakers who sometimes seem ill equipped when it comes to cybersecurity; lawyers can be far from perfect in this regard too.

The Importance of "S" in "CISO"

The Importance of "S" in "CISO"

As cybersecurity has become the need of the business, we turn to our management for guidance from a CISO.

MIT’s Investment in AI a Harbinger of What is to Come

MIT’s Investment in AI a Harbinger of What is to Come

MIT is boldly investing in preparing students for a world that will be recalibrated by AI.

Cranes Exposed to Possible Cyber-Sabotage—What We Can Learn

Cranes Exposed to Possible Cyber-Sabotage—What We Can Learn

Why the scenario of a hacked crane is a concern for wider cybersecurity.

Our Bloggers

What’s Hot on Infosecurity Magazine?