Infosecurity Blogs

Smishing: Analyzing Sophisticated Scam Methods

Smishing: Analyzing Sophisticated Scam Methods

The rise of more sophisticated smishing methods has exacerbated the growing threat environment

Hello From Your New Deputy Editor

Hello From Your New Deputy Editor

Our new deputy editor introduces himself and explains why he joined Infosecurity Magazine

Proactive Approach to Soft Skills Gap Needed in Security Industry

Proactive Approach to Soft Skills Gap Needed in Security Industry

There are huge opportunities in the security industry for those who develop their soft skills

Defining Cybersecurity in a Hybrid World

Defining Cybersecurity in a Hybrid World

As many employees return to the office, what security issues do organizations need to focus on?

Securing Containers: Seven Key Concerns and What to Do About Them

Securing Containers: Seven Key Concerns and What to Do About Them

When building out a security strategy for containers, there are generally seven primary concerns. This article explains what they are, and what to do

Brought to you by
Trend Micro

Here’s What Universities Need to Know About Cyber-Attacks

Here’s What Universities Need to Know About Cyber-Attacks

A recent spate of ransomware attacks, suggests that cyber-criminals are taking advantage of the weaknesses of the new hybrid learning model at Universities. Here are three lessons universities need to quickly learn to avoid falling victim to devastating cyber-attacks

Brought to you by
Sophos

A Prequel to Ransomware

A Prequel to Ransomware

How should orgs react to ransomware incidents?

Misconfigurations are the Biggest Threat to Cloud Security: Here's What to Do

Misconfigurations are the Biggest Threat to Cloud Security: Here's What to Do

Four ways to protect against cloud security misconfigurations, the biggest threat to cloud security

Brought to you by
Trend Micro

Why are Companies Still Struggling to Support Safe Remote Working?

Why are Companies Still Struggling to Support Safe Remote Working?

Remote workers continue to pose a major threat to data security, more than a year after the office exodus that caught many companies off guard. Jon Fielding investigates

Brought to you by
Apricorn

The Digital Training Revolution and Mass Mandatory ‘Modulation’

The Digital Training Revolution and Mass Mandatory ‘Modulation’

The effectiveness of digital training is greatly improved with appropriate supervision and leadership

Top 5 Attacks in Commonly Used SaaS Apps

Top 5 Attacks in Commonly Used SaaS Apps

One of the most prevalent places for a company leak or breach has to do with misconfigurations found in an organization's SaaS apps. Here are five examples from real-world attacks.

Brought to you by
Adaptive Shield

The Expanding Scope and Complexity of Credentials Phishing

The Expanding Scope and Complexity of Credentials Phishing

How should orgs combat the rise in credential phishing attacks?

Our Bloggers

What’s Hot on Infosecurity Magazine?