Infosecurity Blogs

Why Bill 34 is Bad News for Internet Privacy

Why Bill 34 is Bad News for Internet Privacy

The S.J.Res. 34 bill has effectively destroyed the privacy of internet users in the US and has taken the world by storm.

The 'Dark RAT'

The 'Dark RAT'

In March 2017, Fujitsu Cyber Threat Intelligence uncovered a newly developed remote access tool referred to by its developer as ‘Dark RAT'

The Domain Name and its Role in Cyber Forensics

The Domain Name and its Role in Cyber Forensics

It remains very easy for anyone to inexpensively buy a domain name, obtain an IP address and set up a host server.

The Security Challenges of Enterprise Container Adoption

The Security Challenges of Enterprise Container Adoption

The blending of development and operations processes into DevOps has also changed the way software is deployed.

Your 2017 Data Centre Security Checklist

Your 2017 Data Centre Security Checklist

There is big money to be made extorting an organization’s data center—or “brain”.

Enterprise Security for the Home

Enterprise Security for the Home

The arrival of the IOT era means it is time that Internet security is taken more seriously by everyone and that the answer is to introduce enterprise-class systems and controls to protect home networks.

Five Questions Board Members Should Ask Their CISO

Five Questions Board Members Should Ask Their CISO

Security isn’t something that can just be swept under the rug while the board and executive team plans on just pointing figures if something bad happens

Collaboration is the Key to Effective Cyber-defense

Collaboration is the Key to Effective Cyber-defense

Every year, cybersecurity rises up the business agenda. Today, putting the right protection and protocols in place to defend against growing cyber-risks is front of mind for boardrooms around the world

Ransomware "Your Money, or your Data!"

Ransomware "Your Money, or your Data!"

There may never be a cyber-silver bullet to protect you 100% of the time against these pervasive threats; those who claim they can, will inevitably face disappointed end users.

#WCSC17: A Day at World Cybersecurity Congress 2017

#WCSC17: A Day at World Cybersecurity Congress 2017

This week Islington’s Business Design Centre played host to the World Cybersecurity Congress 2017, with a schedule packed full of interesting sessions and discussions from speakers from a variety of different sectors and specialties

GDPR Compliance: Time to Face Mission Impossible?

GDPR Compliance: Time to Face Mission Impossible?

The subject of GDPR compliance continues to be on the lips of many in the information security industry, and rightly so as the regulation promises to revolutionize the way we work and store data

The Rise of the Threat Hunter

The Rise of the Threat Hunter

Being proactive, sniffing out threats, and improving detection and response times is vital in the ongoing fight against cyber-attacks. A mix of prevention and response is the ideal strategy.

What’s Hot on Infosecurity Magazine?