Infosecurity Blogs

Unraveling the Challenges of Log4j

Unraveling the Challenges of Log4j

Log4j is particularly dangerous, so what is the solution in combatting it?

Why Remote Access in Manufacturing is a Dangerous Game

Why Remote Access in Manufacturing is a Dangerous Game

Any investment in securing third-party access points is an investment in the greater good of your organization

Brought to you by
SecureLink

Celebrating a New Era for Infosecurity Europe and Cyber House Party

Celebrating a New Era for Infosecurity Europe and Cyber House Party

For the first time, Cyber House Party will be held during Infosecurity Europe, on Wednesday June 22

Protecting All Users Is What's Next for MFA

Protecting All Users Is What's Next for MFA

Truly increasing MFA adoption requires a more fundamental shift in the organization’s security posture

Brought to you by
IS Decisions

Phishing Takeaways from the Conti Ransomware Leaks

Phishing Takeaways from the Conti Ransomware Leaks

Phishing-related takeaways Cofense Intelligence analysts discovered in the Conti leaks

Brought to you by
Cofense

GDPR and Google Analytics – Privacy Concerns and Compliance Steps

GDPR and Google Analytics – Privacy Concerns and Compliance Steps

Harman Singh explains how organizations can ensure they follow GDPR rules using Google Analytics

I'm @InfosecEditor...Get Me Out of Here!

I'm @InfosecEditor...Get Me Out of Here!

Eleanor Dallaway reflects on her 15 years as Infosecurity Magazine Editor and announces that it’s time for someone else to take a spin in the editor’s chair.

New OWASP Top 10: Beware of Poor Security Practices

New OWASP Top 10: Beware of Poor Security Practices

The OWASP Top 10 list, with good security practices and solutions, makes it easier to enforce better security posture

Brought to you by
Citrix

Why “Shields Up” Starts with Understanding and Protecting the Attack Surface

Why “Shields Up” Starts with Understanding and Protecting the Attack Surface

With the threat of en masse cyber-attacks from Russia, organizations should develop a 'Shields Up' security strategy

OWASP Risk Ranking Changes Reflect Transforming and Dynamic Nature of Security

OWASP Risk Ranking Changes Reflect Transforming and Dynamic Nature of Security

The changes in the relative ranking of each application security risk and what they mean to you

Brought to you by
Citrix

Has Your Code Leaked?

Has Your Code Leaked?

How to find out if your company is a victim of a source code leak

Brought to you by
GitGuardian

The Most In-Demand Cyber Skill for 2022

The Most In-Demand Cyber Skill for 2022

A new category was rated as the most in-demand cybersecurity skill during this year's annual ISACA report

Our Bloggers

What’s Hot on Infosecurity Magazine?