Infosecurity Blogs

Security by Liquified Information

Security by Liquified Information

A mismatch about what roles, responsibilities, and complexity are imposed by current information security risk management.

Punycode: Undetectable, but not Unbeatable

Punycode: Undetectable, but not Unbeatable

While Punycode attacks can be beaten, there’s only so much that businesses can do to protect individuals and organizations.

CRM Communication via Beacons with Security & Privacy in Mind

CRM Communication via Beacons with Security & Privacy in Mind

Beacon technology is becoming more and more popular within retailers

Brought to you by
Comarch

Successful Digital Transformation Requires Swift, but Informed Action

Successful Digital Transformation Requires Swift, but Informed Action

Digital transformation is overhauling how enterprises are going about meeting those objectives.

Why BYOD Authentication Struggles to be Secure

Why BYOD Authentication Struggles to be Secure

Given that the general concept in security has always been to eliminate passwords and use MFA, recent survey results are surprising, so why is there a disconnect?

Pen Testing & Scanning for Vulnerabilities: Differences & Methodologies

Pen Testing & Scanning for Vulnerabilities: Differences & Methodologies

The question of how to protect a business and prevent attacks has never been more important

Security Alert: Worrisome Security Risks Discovered in LG Smart Devices

Security Alert: Worrisome Security Risks Discovered in LG Smart Devices

Smart vacuum cleaners with sensors and a video camera can be hacked and abused by cyber-criminals

Brought to you by
Portnox

Improving Network Security With Software-Defined Networking

Improving Network Security With Software-Defined Networking

SDN has shifted the perception of value from hardware to software, and has made it crucial to understand the evolving cyber threat landscape and security challenges around it.

Brought to you by
Comarch

Huge Changes are Coming: it's Time to Prepare Technologically for GDPR

Huge Changes are Coming: it's Time to Prepare Technologically for GDPR

Should we expect GDPR to create a major upheaval? Do the upcoming changes hold anything to fear? The answer to both questions is “not necessarily”.

Brought to you by
Comarch

The Top 10 Worst Social Media Cyber-Attacks

The Top 10 Worst Social Media Cyber-Attacks

In light of National Cybersecurity Awareness Month, the ZeroFOX team compiled a list of the ten worst social media attacks of all time.

Tools Every IT Department Needs to Use

Tools Every IT Department Needs to Use

Despite there now being far greater awareness of cybersecurity threats, the preventative measures that organizations are adopting are largely either insufficient or ineffective.

Cutting the Phishing Line with User Authorization

Cutting the Phishing Line with User Authorization

Identity theft is still a problem in the 21st century. More and more areas of our lives are being supported by IT. Banking, e-business and education are just some areas in which an individual’s identity is used in virtual and digital reality

Brought to you by
Comarch

Our Bloggers

What’s Hot on Infosecurity Magazine?