Infosecurity Blogs

2022: A Checklist for the Year of Heightened Cyber Risk

2022: A Checklist for the Year of Heightened Cyber Risk

Harman Singh sets out steps organizations need to take to protect themselves amid heightened cyber-risks

What Law Firms Need to Know About Cybersecurity

What Law Firms Need to Know About Cybersecurity

Why law firms must put proactive security measures in place to detect and prevent data breaches

Brought to you by
SecureLink

Cybercrime: A Clear and Present Danger

Cybercrime: A Clear and Present Danger

Organizations need to rapidly respond to threats that strike throughout their entire network infrastructure

Brought to you by
Indusface

Travel and Hospitality Fraud is Growing: Here’s How it Works

Travel and Hospitality Fraud is Growing: Here’s How it Works

An underground market has developed around hospitality and travel fraud, and organizations and consumers must be aware

How Threat Actors Weaponize Your Trust

How Threat Actors Weaponize Your Trust

Trust is one of the preferred weapons of any criminals, and organizations should adapt their security with this in mind

A Smarter Cyber-Risk Management Strategy

A Smarter Cyber-Risk Management Strategy

Why you must integrate cyber-resilience into digital risk assurance programs tailored to the business

Brought to you by
LRQA

New VIP3R Campaign Highlights the Dangers of Spearphishing

New VIP3R Campaign Highlights the Dangers of Spearphishing

A unique spearphishing campaign, VIP3R, highlights the growing sophistication of these types of threats

A Practical Lesson in Collaborative Security

A Practical Lesson in Collaborative Security

Collaboration is important to mitigating risk, remediating vulnerabilities and reaching compliance

Brought to you by
ActZero

Empathy: The Overlooked Ingredient in Cybersecurity

Empathy: The Overlooked Ingredient in Cybersecurity

The cybersecurity industry needs to embrace empathy and honesty to help keep pace with cyber-threats

Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts

Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts

Worryingly, companies still rely on conventional solutions to assess bots

Brought to you by
Indusface

Tackling the Emerging Threat of Session Hijacking and MFA Bypass

Tackling the Emerging Threat of Session Hijacking and MFA Bypass

Cyber-criminals are finding ways to bypass MFA - how can organizations respond?

What Does Zero Trust Mean for MSPs?

What Does Zero Trust Mean for MSPs?

MSPs benefit from zero trust because it implies a long-term relationship with customers

Brought to you by
IS Decisions

Our Bloggers

What’s Hot on Infosecurity Magazine?