Infosecurity Blogs

Why the Holidays are the Most Wonderful Time of the Year for Fraudsters

Why the Holidays are the Most Wonderful Time of the Year for Fraudsters

Just like manufacturers and e-commerce stores, threat actors ready themselves for the busiest time of the year

Top Three Things Organizations Need to Stay Secure in 2023

Top Three Things Organizations Need to Stay Secure in 2023

In this article, Jamf lists three important aspects of solving the security puzzle

Brought to you by
Jamf

DDoS Attacks in 2022: Trends and Obstacles Amid Worldwide Political Crisis

DDoS Attacks in 2022: Trends and Obstacles Amid Worldwide Political Crisis

Ramil Khantimirov, CEO and co-founder StormWall, shared his views on the global trends affecting DDoS attacks

Brought to you by
StormWall

#BlackFriday: Preparing for Online Shopping Scams This Holiday Season

#BlackFriday: Preparing for Online Shopping Scams This Holiday Season

Javvad Malik highlights the types of scams consumers should be looking out for this year's holiday shopping season

Template Injection Attacks: Protecting Against Camouflaged URLs

Template Injection Attacks: Protecting Against Camouflaged URLs

Organizations can no longer rely on traditional security tools to protect against advanced threats

The Enemy Has Deep Pockets: How safe are your user accounts?

The Enemy Has Deep Pockets: How safe are your user accounts?

Understand the latest techniques bot operators are using to bypass traditional detection methods and what to do to avoid falling victim to an attack

Brought to you by
DataDome

How to be Mindful of Security Threats During the FIFA World Cup

How to be Mindful of Security Threats During the FIFA World Cup

How are cyber-attackers likely to target the upcoming FIFA football world cup, and how can these threats be mitigated?

Solving the Cybersecurity Permacrisis

Solving the Cybersecurity Permacrisis

Enterprises that make the time and space for their security staff to learn will achieve much higher levels of security

How Schools Can Become Cyber Resilient in 2023

How Schools Can Become Cyber Resilient in 2023

Threat actors continue to target schools and the data they hold. This article provides advice and tips on how they cany protect themselves from an attack.

Microsoft 365 Apps Continue to be the Most Exploited Cloud Services

Microsoft 365 Apps Continue to be the Most Exploited Cloud Services

As attacks on cloud applications grow, it is essential that businesses gain greater visibility over their cloud infrastructure

Data Protection is the Heart of Zero Trust, Forrester Reports

Data Protection is the Heart of Zero Trust, Forrester Reports

Fasoo's Ron Arden analyses Forrester's latest report, The Definition of Modern Zero Trust

Brought to you by
Fasoo

Protecting Your Business as DDoS Attacks Set to Surge

Protecting Your Business as DDoS Attacks Set to Surge

From politically motivated efforts to ransom extortion, nobody is safe from getting hit by a DDoS attack.

Brought to you by
StormWall

Our Bloggers

What’s Hot on Infosecurity Magazine?