Infosecurity Blogs

An Inside Look at Hive’s RaaS Tactics

An Inside Look at Hive’s RaaS Tactics

The Hive group's aggressive tactics and regular variant upgrades make it a formidable adversary

Compliance vs Security: A Look into Passwords

Compliance vs Security: A Look into Passwords

New research shows that relying on compliant passwords does nothing to protect your network

Brought to you by
Specops

Digital Trust: From Brand Damaging to Brand Managing

Digital Trust: From Brand Damaging to Brand Managing

How can organizations achieve consumer confidence in their security and privacy posture?

What You Should Do When Two-Factor Authentication Becomes a Security Requirement

What You Should Do When Two-Factor Authentication Becomes a Security Requirement

The desire for enhanced digital security has caught the attention of governments around the world, all looking to protect consumers and businesses

Brought to you by
IS Decisions

How Ransomware Has Become a Geopolitical Risk for Governments

How Ransomware Has Become a Geopolitical Risk for Governments

There has been a significant escalation in attacks targeting government organizations this year

The Industrial Cyber-Attack Evolution: How to Keep Your Network Safe

The Industrial Cyber-Attack Evolution: How to Keep Your Network Safe

Industrial organizations face growing cyber threats - how can they stay one step ahead of the attackers?

Brought to you by
Forescout

Stand Down, Marketers: Zero Trust is Not a Product

Stand Down, Marketers: Zero Trust is Not a Product

If correctly understood and carefully implemented, zero trust has a huge amount to offer organizations of every size

Brought to you by
IS Decisions

Browser exploits: A Concerning Revival Led by the Lazarus Group

Browser exploits: A Concerning Revival Led by the Lazarus Group

The notorious Lazarus group is spearheading growing efforts to leverage zero-day vulnerabilities in the browser

Modern Authentication for Multiple User Journeys - Best Guidance

Modern Authentication for Multiple User Journeys - Best Guidance

If implemented properly, modern authentication can secure a growing attack surface and avoid security burnout

Brought to you by
Thales

Cyber Essential’s Password-Based Authentication Requirements

Cyber Essential’s Password-Based Authentication Requirements

Cyber Essentials revised its password-based authentication requirements in 2022 as a response to the ever-changing threat landscape

Brought to you by
Specops

Let’s Rethink Cybersecurity Training Investment

Let’s Rethink Cybersecurity Training Investment

We need to make training targeted to tasks we can realistically expect people to do

2022: A Checklist for the Year of Heightened Cyber Risk

2022: A Checklist for the Year of Heightened Cyber Risk

Harman Singh sets out steps organizations need to take to protect themselves amid heightened cyber-risks

Our Bloggers

What’s Hot on Infosecurity Magazine?