Infosecurity Blogs

The Dystopic Future of Cybersecurity and the Importance of Empowering CISOs

The Dystopic Future of Cybersecurity and the Importance of Empowering CISOs

Vanessa Pegueros explores the importance of empowering CISOs facing the ever-traumatizing threats of cybercrime

Brought to you by
OneLogin

CISO Stories: Part Two

CISO Stories: Part Two

This is the story of Boris, CISO at an international charity

Misconfigurations are Mistakes: Eliminate the Biggest Vulnerability in Cloud Services

Misconfigurations are Mistakes: Eliminate the Biggest Vulnerability in Cloud Services

Mark Nunnikhoven argues that organizations should be pushing to move faster to the cloud in order to improve their security

Brought to you by
Trend Micro

Time for Infosec Professionals’ Imaginations to Stretch to Outer Space

Time for Infosec Professionals’ Imaginations to Stretch to Outer Space

Cybersecurity must be at the heart of the development of the space sector

Six Ways to Improve Your Cyber-Resilience to Combat Cyber-Attacks

Six Ways to Improve Your Cyber-Resilience to Combat Cyber-Attacks

Six tips for improving your company's cyber-resilience to combat cyber-attacks in 2021

Brought to you by
Indusface

The Benefits of Unified Physical Security Systems

The Benefits of Unified Physical Security Systems

Unified security systems can greatly enhance business operations

Brought to you by
Genetec

The Risk of Collaboration Apps

The Risk of Collaboration Apps

How have cyber-criminals exploited the rise in collaboration apps, and what can orgs do about it?

How Hackers Use Cloud Services to Make Cybercrime More Profitable

How Hackers Use Cloud Services to Make Cybercrime More Profitable

Cloud services can optimize resources, save time, increase automation, and take some of the security responsibility off of an organization’s plate.

Brought to you by
Trend Micro

The Five Strategies Users Use to Determine Phishing: Which Work and Which Don’t?

The Five Strategies Users Use to Determine Phishing: Which Work and Which Don’t?

Verizon estimates that 90% of all data breaches originate from phishing and according to the Anti Phishing Working Group, the number of phishing websites are at an all-time high right now.

A Story of Human Error and Revenge

A Story of Human Error and Revenge

Organizations must understand how employee stress can lead to cybersecurity errors

Too Much Trust?

Too Much Trust?

Have security pros been too relaxed about cyber-threats during the pandemic?

Brought to you by
Apricorn

Addressing Burn Out in Cybersecurity Teams

Addressing Burn Out in Cybersecurity Teams

With cyber-threats increasing rapidly, what steps can be taken to help avoid burn out in security teams?

Our Bloggers

What’s Hot on Infosecurity Magazine?