Infosecurity Blogs

Travel and Hospitality Fraud is Growing: Here’s How it Works
An underground market has developed around hospitality and travel fraud, and organizations and consumers must be aware

How Threat Actors Weaponize Your Trust
Trust is one of the preferred weapons of any criminals, and organizations should adapt their security with this in mind

A Smarter Cyber-Risk Management Strategy
Why you must integrate cyber-resilience into digital risk assurance programs tailored to the business
Brought to you by
LRQA

New VIP3R Campaign Highlights the Dangers of Spearphishing
A unique spearphishing campaign, VIP3R, highlights the growing sophistication of these types of threats

A Practical Lesson in Collaborative Security
Collaboration is important to mitigating risk, remediating vulnerabilities and reaching compliance
Brought to you by
ActZero

Empathy: The Overlooked Ingredient in Cybersecurity
The cybersecurity industry needs to embrace empathy and honesty to help keep pace with cyber-threats

Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts
Worryingly, companies still rely on conventional solutions to assess bots
Brought to you by
Indusface

Tackling the Emerging Threat of Session Hijacking and MFA Bypass
Cyber-criminals are finding ways to bypass MFA - how can organizations respond?

What Does Zero Trust Mean for MSPs?
MSPs benefit from zero trust because it implies a long-term relationship with customers
Brought to you by
IS Decisions

Unraveling the Challenges of Log4j
Log4j is particularly dangerous, so what is the solution in combatting it?

Why Remote Access in Manufacturing is a Dangerous Game
Any investment in securing third-party access points is an investment in the greater good of your organization
Brought to you by
SecureLink

Celebrating a New Era for Infosecurity Europe and Cyber House Party
For the first time, Cyber House Party will be held during Infosecurity Europe, on Wednesday June 22