Infosecurity Blogs

  1. In Rust We Trust: What’s the Story with Developers’ Most Beloved Language?

    Rust's growing popularity is fueled by its unique combination of performance, memory safety, and developer satisfaction

    1. Photo of Yehuda Gelb

      Yehuda Gelb

      Senior Security Researcher, Checkmarx

  2. Enhancing Cloud Security: Securing Windows and Linux Operating Systems with CIS Hardened Images

    The movement towards cloud computing offers countless benefits such as business scalability and cost optimization, but it also presents a security risk often overlooked

    1. Photo of Mia Lavada

      Mia Lavada

      Product Manager, Center for Internet Security

  3. How to Address Shortcomings in API Security

    ISACA's Sushila Nair explains why APIs security should be a top priority for organizations

    1. Photo of Sushila Nair

      Sushila Nair

      CEO, Cybernetic LLC

  4. Why the NCSC Cyber Assessment Framework is Important to the UK Public Sector

    The UK's NCSC has introduced the CAF to help organizations, especially those involved in CNI, assess and improve their cybersecurity practices to mitigate growing cyber threats

    1. Photo of Ann  Chesbrough

      Ann Chesbrough

      Vice President Product Marketing, BreachLock

  5. Seven Ways Hackers Can Access Company Information

    The increased digitization of businesses has made them more vulnerable to cyber-attacks, emphasizing the need for robust cybersecurity measures to protect sensitive information

    1. Photo of Sadie  Smith

      Sadie Smith

      Author, Bazoom Group

  6. Infosecurity Magazine Online Summit Autumn 2024 Day One Sessions

    You can find all the sessions from today’s Online Summit here including our keynote talk, fireside chat and panel discussions. Security by Design in Digital Transformation: Lessons from the National Trust

  7. Strategies to Balance Frictionless User Experience with Robust Security

    Organizations face the dual challenge of protecting their systems and applications while providing seamless access to users. Striking this balance is not only a technical requirement, but a business imperative

    1. Photo of Maxwell  Shofron

      Maxwell Shofron

      Sr. Solution Engineer Team Lead, One Identity

  8. CompTIA: A Launchpad for a Career in Cybersecurity

    The CompTIA A+ certification has global recognition, imparts basic knowledge and skills necessary for anyone wanting to build a career in cybersecurity

  9. How to Export Public Folder to PST in Microsoft Exchange

    Stellar’s Bharat Bushan provides ways to export Microsoft Exchange’s public folders to PST

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  10. Addressing the Frustrations and Concerns of Infosecurity Professionals

    Javvad Malik discusses the issues he found to be top of mind of cybersecurity professionals during Infosecurity Europe 2024

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  11. CrowdStrike Windows Outage: What We Can Learn

    ISACA’s Divya Aradhya sets out lessons software providers and end users can learn from the CrowdStrike Windows Outage on July 19

    1. Photo of Divya Aradhya

      Divya Aradhya

      Head of Cyber Architecture for Banking & International, Citi

  12. PAM For Small to Medium-Sized Enterprises: Comprehensive Protection Without Complexity

    Many enterprises are now prioritizing the implementation of privileged access management solutions to safeguard against cyber-attacks

    1. Photo of Phil Freeman

      Phil Freeman

      Senior Solutions Architect, One Identity

  13. SaaS Security in Europe: A Report Card

    More than 70% of organizations in Europe are now making SaaS cybersecurity a priority

    1. Photo of Hananel Livneh

      Hananel Livneh

      Head of Product Marketing, Adaptive Shield

  14. How to Secure Against Access Management’s Biggest Risks: Shadow IT and BYOD

    Legacy security tools struggle with today's work environment, but Extended Access Management secures both approved and unauthorized devices and applications

    1. Photo of Steve Won

      Steve Won

      Chief Product Officer, 1Password

  15. The Huge Threat Posed by Increased Targeting of Cloud Services

    Netskope's Paolo Passeri explains how cyber espionage and cybercrime operations are targeting cloud services

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  16. How to Recover MS SQL Database from Suspect Mode

    Understand why a SQL database might enter "suspect mode," where it's unavailable due to a failed recovery process, and how to fix it

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  17. How To Bridge the Access Management Gap in Your Business’ Security Strategy

    In the age of SaaS, extended access management offers a solution to secure all applications and devices, mitigating the risks associated with unmanaged software

    1. Photo of Steve Won

      Steve Won

      Chief Product Officer, 1Password

  18. Exploring SaaS Security with DORA

    The EU's Digital Operational Resilience Act, implemented to fortify financial institutions against cyberattacks, requires compliance by January 2025 with hefty potential fines for non-adherence

    1. Photo of Hananel Livneh

      Hananel Livneh

      Head of Product Marketing, Adaptive Shield

  19. Hardened Ubuntu Container Images are Now Available in the Iron Bank

    US government agencies can now access secure, pre-configured Ubuntu container images through the US Air Force's Iron Bank platform

    1. Photo of Devin Breen

      Devin Breen

      Director of Federal, Canonical

  20. IT Leaders Agree: SSO Isn’t Enough

    Security professionals have turned to single sign-on (SSO) to help secure all of their apps, but it’s becoming increasingly clear that SSO isn’t enough. Businesses need a complete approach to secure identity, devices, and applications

    1. Photo of Steve Won

      Steve Won

      Chief Product Officer, 1Password

What’s hot on Infosecurity Magazine?