Infosecurity Blogs

"In the Underworld" - What can Cybersecurity learn from the World of 1980s' Professional Crime?

"In the Underworld" - What can Cybersecurity learn from the World of 1980s' Professional Crime?

What can the modern cybersecurity company learn from a 1980s criminal investigations?

GDPR Questions Answered: Our Web App Could Store Data

GDPR Questions Answered: Our Web App Could Store Data

To help solve your GDPR queries, data privacy offer and expert Steve Wright is joining us to answer your questions.

Protecting Your Data From The Hacker Threat, Part One

Protecting Your Data From The Hacker Threat, Part One

These approaches can be implemented in every data center, and will go a long way in minimizing susceptibility to attack.

Failed Incident Responses from 2017 Provide Important Case Studies

Failed Incident Responses from 2017 Provide Important Case Studies

How 2017 will provide instructors are armed with new, relevant material that can provide excellent case studies on how not to respond to an incident.

How 2017 Thrusted Cybersecurity Into the National Spotlight

How 2017 Thrusted Cybersecurity Into the National Spotlight

Skills, ransomware and unpatched systems made 2-17 a memorable year in cybersecurity.

What are IT professionals guilty of in 2017?

What are IT professionals guilty of in 2017?

Perhaps it's time to shine an uncompromising light on the IT security failures of 2017—the sins we are guilty of as IT professionals—in a hopeful bid to inspire us to instigate change and maybe even prepare New Years' resolutions for 2018 that will actually be kept.

Security by Liquified Information

Security by Liquified Information

A mismatch about what roles, responsibilities, and complexity are imposed by current information security risk management.

Punycode: Undetectable, but not Unbeatable

Punycode: Undetectable, but not Unbeatable

While Punycode attacks can be beaten, there’s only so much that businesses can do to protect individuals and organizations.

CRM Communication via Beacons with Security & Privacy in Mind

CRM Communication via Beacons with Security & Privacy in Mind

Beacon technology is becoming more and more popular within retailers

Brought to you by
Comarch

Successful Digital Transformation Requires Swift, but Informed Action

Successful Digital Transformation Requires Swift, but Informed Action

Digital transformation is overhauling how enterprises are going about meeting those objectives.

Why BYOD Authentication Struggles to be Secure

Why BYOD Authentication Struggles to be Secure

Given that the general concept in security has always been to eliminate passwords and use MFA, recent survey results are surprising, so why is there a disconnect?

Our Bloggers

What’s Hot on Infosecurity Magazine?