Infosecurity Blogs

Cloud Accounts: A Growing Target for Opportunistic and State-Sponsored Threat Actors

Cloud Accounts: A Growing Target for Opportunistic and State-Sponsored Threat Actors

With users being the new perimeter, attackers are focusing their efforts on cloud identities

Improve Visibility for a Secure Cloud Migration

Improve Visibility for a Secure Cloud Migration

Why a security services platform is the solution IT and developer teams need

Brought to you by
Trend Micro

Scanning Docker Images for Secrets

Scanning Docker Images for Secrets

Owing to their structure and usage, docker images are likely to contain hidden secrets

Brought to you by
GitGuardian

Education Could Be the Test for Cyber-Attackers

Education Could Be the Test for Cyber-Attackers

Why education institutions are vulnerable to data loss and theft and a tempting target for hackers

Brought to you by
Apricorn

#BlackFriday: The Holidays Are Around the Corner, and so Are the Scammers!

#BlackFriday: The Holidays Are Around the Corner, and so Are the Scammers!

Javvad Malik offers advice to online shoppers about how to stay secure over the upcoming shopping season

Serverless and Application Security

Serverless and Application Security

Why organizations need a comprehensive, purpose-built tool for serverless security

Brought to you by
Contrast Security

Cloud Security Posture Management (CSPM) Is Insufficient Without Visibility

Cloud Security Posture Management (CSPM) Is Insufficient Without Visibility

CSPM is critical, but security teams need additional visibility and improved accuracy

Brought to you by
RedSeal

FISMA Requirements: Are You Compliant?

FISMA Requirements: Are You Compliant?

Why complying with FISMA also extends into data destruction and device disposal practices

Brought to you by
SEM

Simplifying Cloud Compliance Through Automation

Simplifying Cloud Compliance Through Automation

In the cloud computing world, conforming to compliance standards and regulations sets you up for success

Brought to you by
Trend Micro

UK GDPR Post-Brexit: Everything You Need to Know

UK GDPR Post-Brexit: Everything You Need to Know

Harman Singh sets out the implications of the UK's new data protection regime post-Brexit

Overcoming the 3 Biggest Challenges in System Hardening

Overcoming the 3 Biggest Challenges in System Hardening

Why it's essential an organization picks the right approach to system hardening – automated or non-automated

Brought to you by
CalCom

Post-pandemic Growth Starts With Understanding Cyber Risk

Post-pandemic Growth Starts With Understanding Cyber Risk

Only a security-by-design culture can enable organizations to deliver digital innovation projects effectively

Brought to you by
Trend Micro

Our Bloggers

What’s Hot on Infosecurity Magazine?