Infosecurity Blogs

How The Industry Responds to the Cybersecurity Skills Shortage

How The Industry Responds to the Cybersecurity Skills Shortage

To hear that the Government is setting aside significant investment to teach teenagers vital cybersecurity skills is welcome news, especially at a time when there is a serious lack of digital skills and an increased threat to companies’ digital infrastructures.

Digesting the Diversity of Data Breaches

Digesting the Diversity of Data Breaches

The diverse nature of cyber-threats can make one quite unique from another, affecting every department within an organization and no longer confined to the IT department

Eagles Take the #Superbowl of Passwords

Eagles Take the #Superbowl of Passwords

Based on the release of ten million passwords, the data crunching revealed that the most popular gridiron team for a password was the Philadelphia Eagles, followed by the Dallas Cowboys, Pittsburgh Steelers and Oakland Raiders

Come Fly with Me: Securing the Drone

Come Fly with Me: Securing the Drone

New report seeks to aid the safe and secure creation and operation of unmanned aircraft systems

Ultrasonic Cross-Device Tracking

Ultrasonic Cross-Device Tracking

The Risk Avengers take a look at the issue of ultrasonic cross-device tracking

(ISC)2 - Top Trends to Watch in 2017

(ISC)2 - Top Trends to Watch in 2017

As we enter 2017, this will be the year in which the potential cracks in the pillars of the knowledge economy start to show.

IoT Denial of Service Botnets and SCADA Attacks to Plague 2017

IoT Denial of Service Botnets and SCADA Attacks to Plague 2017

With 2016 now behind us, it’s time to reflect on the security incidents that troubled our year and look to the challenges ahead

RIG EK Dropping TrickBot Trojan & Madness/Quant Loader DoS Bot

RIG EK Dropping TrickBot Trojan & Madness/Quant Loader DoS Bot

As the exploit market begins to diversify, it has seen the introduction of new threats, the most recent being the inclusion of a relative new comer in TrickLoader and an older threat known as TrickBot

How to Build a Culture of Cybersecurity

How to Build a Culture of Cybersecurity

In spite of the highest levels of management insisting that it is a priority to protect data, why is it that some of us take those enabling actions? Why isn't everyone on board with cybersecurity?

The Non-Refundable Fundamentals: Estimating the Cost of a Data Breach

The Non-Refundable Fundamentals: Estimating the Cost of a Data Breach

Quantifying the financial impact of a data breach before it occurs is like assuming you can win roulette using insider trading

DaaS, VDI, and the Changing World of the Desktop

DaaS, VDI, and the Changing World of the Desktop

This brave new world has even seen significant changes in the way that desktops are delivered, with DaaS (desktop as a service) and VDI (virtual-desktop infrastructure) becoming a more pressing need for modern business.

On the 12th Day of Christmas, the Industry Predicted…a Skills Gap Challenge

On the 12th Day of Christmas, the Industry Predicted…a Skills Gap Challenge

Experts have their say on what they expect the cybersecurity skills scene to be like in 2017

What’s Hot on Infosecurity Magazine?