Infosecurity Blogs

State of SecOps 2021: 5 Trends That Should Shape Your Security Approach

State of SecOps 2021: 5 Trends That Should Shape Your Security Approach

Businesses must adopt a threat modeling framework, implement processes for managing the attack surface and aggressively push automation

Brought to you by
Micro Focus

Securing Software: The Root Cause Conundrum

Securing Software: The Root Cause Conundrum

DevSecOps is part of the answer to producing secure software, but it's not enough

Integrating XDR into your SOC

Integrating XDR into your SOC

Discover the top myths around XDR, EDR and MDR and look into how to integrate XDR effectively into your SOC, without breaking the bank

Brought to you by
e2e

Reduce risk and innovate anywhere with a Cloud without Compromise

Reduce risk and innovate anywhere with a Cloud without Compromise

Why the vision of the future cannot be based on the paradigm of the past

Brought to you by
IBM Cloud

Debunking Hard Drive Destruction Misconceptions

Debunking Hard Drive Destruction Misconceptions

The correct path is following NSA standards and degaussing all magnetic media

Brought to you by
SEM

Fixing a Common Active Directory Weakness: Poor Authentication Security

Fixing a Common Active Directory Weakness: Poor Authentication Security

This article dives into one common AD weakness – poor authentication security – and how to address it to improve the organization’s overall security posture

Brought to you by
Semperis

Think Your End-of-Life Data is Destroyed? Think Again!

Think Your End-of-Life Data is Destroyed? Think Again!

It is a scary but familiar misbelief that simply erasing drives clean is enough to keep your information safe

Brought to you by
SEM

ISOMorph and HTML Smuggling

ISOMorph and HTML Smuggling

How should organizations combat the re-emergence of HTML smuggling?

Elevated Cyber-risk as Companies Choose Speed Over Security

Elevated Cyber-risk as Companies Choose Speed Over Security

To lower cyber-risk, organizations must be better prepared by going back to basics

Brought to you by
Trend Micro

Is Complacency the Biggest Cyber Threat?

Is Complacency the Biggest Cyber Threat?

What does ISACA's recent State of Cybersecurity report tell us about the best ways to tackle rising cyber-attacks?

Top 5 Secrets for Mitigating Cyber-attacks in Microsoft 365 Environments

Top 5 Secrets for Mitigating Cyber-attacks in Microsoft 365 Environments

Five renowned experts share best practices for preventing and mitigating cyber-attacks in Microsoft 365 environments

Brought to you by
Acronis

Cybersecurity, Community and Change: How to Meet the Coming Challenge

Cybersecurity, Community and Change: How to Meet the Coming Challenge

As we enter the fourth industrial revolution, we require a community effort to reskill and upskill people into digital security careers

Our Bloggers

What’s Hot on Infosecurity Magazine?