Infosecurity Blogs

(ISC)2 - Top Trends to Watch in 2017

(ISC)2 - Top Trends to Watch in 2017

As we enter 2017, this will be the year in which the potential cracks in the pillars of the knowledge economy start to show.

IoT Denial of Service Botnets and SCADA Attacks to Plague 2017

IoT Denial of Service Botnets and SCADA Attacks to Plague 2017

With 2016 now behind us, it’s time to reflect on the security incidents that troubled our year and look to the challenges ahead

RIG EK Dropping TrickBot Trojan & Madness/Quant Loader DoS Bot

RIG EK Dropping TrickBot Trojan & Madness/Quant Loader DoS Bot

As the exploit market begins to diversify, it has seen the introduction of new threats, the most recent being the inclusion of a relative new comer in TrickLoader and an older threat known as TrickBot

How to Build a Culture of Cybersecurity

How to Build a Culture of Cybersecurity

In spite of the highest levels of management insisting that it is a priority to protect data, why is it that some of us take those enabling actions? Why isn't everyone on board with cybersecurity?

The Non-Refundable Fundamentals: Estimating the Cost of a Data Breach

The Non-Refundable Fundamentals: Estimating the Cost of a Data Breach

Quantifying the financial impact of a data breach before it occurs is like assuming you can win roulette using insider trading

DaaS, VDI, and the Changing World of the Desktop

DaaS, VDI, and the Changing World of the Desktop

This brave new world has even seen significant changes in the way that desktops are delivered, with DaaS (desktop as a service) and VDI (virtual-desktop infrastructure) becoming a more pressing need for modern business.

On the 12th Day of Christmas, the Industry Predicted…a Skills Gap Challenge

On the 12th Day of Christmas, the Industry Predicted…a Skills Gap Challenge

Experts have their say on what they expect the cybersecurity skills scene to be like in 2017

On the 11th Day of Christmas, the Industry Predicted…Better Security Collaboration

On the 11th Day of Christmas, the Industry Predicted…Better Security Collaboration

2017 could be the year we see collaborative security come into fruition like never before

On the Tenth Day of Christmas, the Industry Predicted…Cloud Vendor Compromise

On the Tenth Day of Christmas, the Industry Predicted…Cloud Vendor Compromise

Experts predict that a major cloud vendor will be in the news for suffering a significant security breach

Deck the Halls With...Cybersecurity Awareness

Deck the Halls With...Cybersecurity Awareness

The Risk Avengers have written a Christmas song especially for the Infosecurity Magazine readers.

On the Ninth Day of Christmas, the Industry Predicted…GDPR Compliance

On the Ninth Day of Christmas, the Industry Predicted…GDPR Compliance

Of course this is a 2017 prediction and I’m well aware that the General Data Protection Regulation (GDPR) does not come into force until 25th May 2018, but with 526 days to go, 2017 is the final full calendar year to achieve compliance and predictions seen by Infosecurity show that it is a case of now or never for your preparations

On the Eighth Day of Christmas, the Industry Predicted…Attackers Making Money

On the Eighth Day of Christmas, the Industry Predicted…Attackers Making Money

In our eighth prediction, we will take a look at the miscreant attackers and predictions on what they will be up to in 2017, and how they will find ways to make more money.

What’s Hot on Infosecurity Magazine?