Infosecurity Blogs

Could 2019 be the End of Cookie Consent Forms?

Could 2019 be the End of Cookie Consent Forms?

How the upcoming ePrivacy Regulation will change the current Cookie law.

Patching and Policy Lessons Learned from WannaCry

Patching and Policy Lessons Learned from WannaCry

IT and cybersecurity professionals that don’t make patching a priority are essentially shining a light on their organization’s weaknesses.

A Step in the Right Direction for Small Business Cybersecurity

A Step in the Right Direction for Small Business Cybersecurity

The NIST Small Business Cybersecurity Act will help organizations gain access to mechanisms that only seemed attainable by larger, better-resourced organizations.

Open Banking to Close Gaps

Open Banking to Close Gaps

As UK banks open their data via secure APIs, third-party providers will be required to adopt security-oriented approaches to enhance the Open Banking initiative’s objective of closing any security gaps.

EU Cybersecurity Certification: a Missed Opportunity

EU Cybersecurity Certification: a Missed Opportunity

What about a standard for products, will the EU cybersecurity certification framework be a positive thing?

CISOs Reveal the Most Likely Culprits for Data Leaks

CISOs Reveal the Most Likely Culprits for Data Leaks

Data security issues can be profoundly damaging. How can your organization avoid them?

Artificial Intelligence Risks Call For Fresh Approaches, Expanded Collaboration

Artificial Intelligence Risks Call For Fresh Approaches, Expanded Collaboration

Time-tested approaches remain important, but traditional methodology will not be enough when it comes to artificial intelligence's potential impact.

Enter Crowdsourced Security, the Future of Pen Testing?

Enter Crowdsourced Security, the Future of Pen Testing?

If crowdsourced security actually tackles the weaknesses in pen testing effectively.

Is it Time to Replace Pen Testing with Crowdsourced security?

Is it Time to Replace Pen Testing with Crowdsourced security?

As crowdsourced security emerges, are we ready to throw away pen testing as a methodology?

So I've Removed Admin Rights...What Now?

So I've Removed Admin Rights...What Now?

Restricting user admin rights is just one important part of improving data security.

Tanium Versus Tachyon: The Big Beasts of the Endpoint Detection and Remediation Jungle go Head-To-Head

Tanium Versus Tachyon: The Big Beasts of the Endpoint Detection and Remediation Jungle go Head-To-Head

Failure to research next generation EDR tools can result in buying a solution unsuited to today’s workplace.

To Reward, or Not to Reward

To Reward, or Not to Reward

Many CSOs have resorted to incentives and punishments to enhance employee reporting of suspect emails and cyber activities, but which of these really work?

Our Bloggers

What’s Hot on Infosecurity Magazine?