Infosecurity Blogs

Enter Crowdsourced Security, the Future of Pen Testing?

Enter Crowdsourced Security, the Future of Pen Testing?

If crowdsourced security actually tackles the weaknesses in pen testing effectively.

Is it Time to Replace Pen Testing with Crowdsourced security?

Is it Time to Replace Pen Testing with Crowdsourced security?

As crowdsourced security emerges, are we ready to throw away pen testing as a methodology?

So I've Removed Admin Rights...What Now?

So I've Removed Admin Rights...What Now?

Restricting user admin rights is just one important part of improving data security.

Tanium Versus Tachyon: The Big Beasts of the Endpoint Detection and Remediation Jungle go Head-To-Head

Tanium Versus Tachyon: The Big Beasts of the Endpoint Detection and Remediation Jungle go Head-To-Head

Failure to research next generation EDR tools can result in buying a solution unsuited to today’s workplace.

To Reward, or Not to Reward

To Reward, or Not to Reward

Many CSOs have resorted to incentives and punishments to enhance employee reporting of suspect emails and cyber activities, but which of these really work?

Should We be Looking Down Under to Improve Our Security?

Should We be Looking Down Under to Improve Our Security?

Organizations that can implement the Essential Eight measures are more likely to be secure against an online assault.

What Can the World Cup Teach Us About Cybersecurity?

What Can the World Cup Teach Us About Cybersecurity?

Just like with World Cup results, in cybersecurity it is not always the team with the strongest players or the best technical strategy that wins.

Back to the Basics - Why we Shouldn't Discount the Lessons of the Cyber Essentials Scheme

Back to the Basics - Why we Shouldn't Discount the Lessons of the Cyber Essentials Scheme

How the Cyber Essentials scheme can aid your cybersecurity resiliency.

Security Culture has to be Intentional and Sustainable

Security Culture has to be Intentional and Sustainable

Your security culture is – and will always be – a subcomponent of your larger organizational culture.

The Perils of Full Administrator Rights

The Perils of Full Administrator Rights

Gaining access to administrative rights is one of the most potent weapons for any malicious agent

Why is the Lucrative Cybersecurity Field still Struggling to Hook Prospective Practitioners?

Why is the Lucrative Cybersecurity Field still Struggling to Hook Prospective Practitioners?

Only 9% of millennials state they are interested in pursuing cybersecurity as a career at some point in their lives.

Dixons Carphone Breach & GDPR: What’s Next?

Dixons Carphone Breach & GDPR: What’s Next?

The first big-name breach post-GDPR has been confirmed, so what can we expect to happen next?

Our Bloggers

What’s Hot on Infosecurity Magazine?