Infosecurity Blogs

DDoS Ransom Attacks: What You Need to Know
Adverse impacts of a ransom attack can be curbed if dealt with swiftly
Brought to you by
Indusface

Premier League Teams Train Together in Defense Against Cyber-Attacks
The English Premier League is a high-value target for would-be cyber-attackers
Brought to you by
Specops

Security by Design Implementation Insights
How can orgs implement a successful security-by-design strategy

Healthcare Carries a Large Target for Ransomware
How can healthcare orgs protect themselves from the threat of ransomware?

CISO Stories: Part One
Part one of Nadine Michaelides’ CISO Stories series tells the tale of a CISO working in the chemical industry

The Future of Crypto and Casinos
Cyptocurrencies find their way into many industries as secure payment options, including gambling
Brought to you by
TopOnSEO

Zero Trust in the Post-Pandemic Era
Security concepts like Zero Trust represent what we need to strive for in the post-pandemic era
Brought to you by
SecureLink

Global Focus on Supply Chain Security Has Transformational Impacts for SMBs
How should small businesses look to develop their security in the current landscape?

Social Engineering and the IT Service Desk
The pandemic has provided a perfect opportunity for many types of social engineering attacks
Brought to you by
Specops

ISO 27701: A Pathway to Privacy and Regulatory Compliance
Answers to some commonly asked questions regarding ISO 27701
Brought to you by
Lloyd's Register

Cybercrime to Scale New Heights in 2021: What Can You do About it?
How can organizations respond to emerging threats effectively?

How Cloud Services Are Exploited for Cyber-Espionage
A number of recent cyber-espionage campaigns share common characteristics