Infosecurity Blogs

  1. Protecting Customer Data with AI Powered CIAM and IGA

    AI-powered strategies can help companies protect customer data, reduce breach risks, and maintain regulatory compliance, fostering trust in the digital age

    1. Photo of Bruce Esposito

      Bruce Esposito

      Product Marketing IGA, One Identity

  2. The State of Cybersecurity: Challenges, Priorities and Insights

    ISACA's Adham Etoom highlights key findings from ISACA's 2024 State of Cybersecurity report, including rising stress levels, skills shortages and budgetary constraints

    1. Photo of Adham Etoom

      Adham Etoom

      Cybersecurity Advisor, Program Manager

  3. Balancing Clients' Security and Functionality in the Cloud

    To ensure the security status of CIS Hardened Images, CIS conducted testing with Azure Monitor Agent and Azure Update Manager, and this blog will discuss the significance, findings, and future plans of this initiative

    1. Photo of Mia Lavada

      Mia Lavada

      Product Manager, Center for Internet Security

  4. The Key Components For a Secure Password Policy (And Why Complexity Isn’t One)

    Learn about the key components for a secure password policy and find out why complexity isn't one of them

    1. Photo of Darren  James

      Darren James

      Senior Product Manager, Specops Software – An Outpost24 Company

  5. What is the NIS2 Directive and Why Now?

    Explore the origins of NIS2 and its key updates

    1. Photo of Seemant  Sehgal

      Seemant Sehgal

      Founder & CEO, BreachLock

  6. FIDO's Frontier: Paving the Way for a Passwordless Future

    FIDO's potential to revolutionize passwordless authentication depends on its ability to achieve widespread adoption through interoperability and cross-platform functionality

    1. Photo of Chris Collier

      Chris Collier

      Identity & Access Management Technologist, Swissbit

  7. Incorporating CSPM within IaaS Strategies for Client Success

    Cloud-based platforms are becoming increasingly popular for managing business operations, leading to a growing demand for MSPs, MSSPs, and IT consultants to implement IaaS strategies while mitigating risks through CSPM integration

    1. Photo of Mia Lavada

      Mia Lavada

      Product Manager, Center for Internet Security

  8. How to Recreate Exchange Database from Scratch

    Understand how to recreated and exchange database from scratch

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  9. #CyberMonth: The Importance of Identity and Access Management in Safeguarding Your Enterprise

    IAM leaders are increasingly vital to cybersecurity, and their roles are expanding as they leverage AI and PAM strategies to protect organizations' digital identities and drive business success

  10. In Rust We Trust: What’s the Story with Developers’ Most Beloved Language?

    Rust's growing popularity is fueled by its unique combination of performance, memory safety, and developer satisfaction

    1. Photo of Yehuda Gelb

      Yehuda Gelb

      Senior Security Researcher, Checkmarx

  11. Enhancing Cloud Security: Securing Windows and Linux Operating Systems with CIS Hardened Images

    The movement towards cloud computing offers countless benefits such as business scalability and cost optimization, but it also presents a security risk often overlooked

    1. Photo of Mia Lavada

      Mia Lavada

      Product Manager, Center for Internet Security

  12. How to Address Shortcomings in API Security

    ISACA's Sushila Nair explains why APIs security should be a top priority for organizations

    1. Photo of Sushila Nair

      Sushila Nair

      CEO, Cybernetic LLC

  13. Why the NCSC Cyber Assessment Framework is Important to the UK Public Sector

    The UK's NCSC has introduced the CAF to help organizations, especially those involved in CNI, assess and improve their cybersecurity practices to mitigate growing cyber threats

    1. Photo of Ann  Chesbrough

      Ann Chesbrough

      Vice President Product Marketing, BreachLock

  14. Seven Ways Hackers Can Access Company Information

    The increased digitization of businesses has made them more vulnerable to cyber-attacks, emphasizing the need for robust cybersecurity measures to protect sensitive information

    1. Photo of Sadie  Smith

      Sadie Smith

      Author, Bazoom Group

  15. Infosecurity Magazine Online Summit Autumn 2024 Day One Sessions

    You can find all the sessions from today’s Online Summit here including our keynote talk, fireside chat and panel discussions. Security by Design in Digital Transformation: Lessons from the National Trust

  16. Strategies to Balance Frictionless User Experience with Robust Security

    Organizations face the dual challenge of protecting their systems and applications while providing seamless access to users. Striking this balance is not only a technical requirement, but a business imperative

    1. Photo of Maxwell  Shofron

      Maxwell Shofron

      Sr. Solution Engineer Team Lead, One Identity

  17. CompTIA: A Launchpad for a Career in Cybersecurity

    The CompTIA A+ certification has global recognition, imparts basic knowledge and skills necessary for anyone wanting to build a career in cybersecurity

  18. How to Export Public Folder to PST in Microsoft Exchange

    Stellar’s Bharat Bushan provides ways to export Microsoft Exchange’s public folders to PST

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  19. Addressing the Frustrations and Concerns of Infosecurity Professionals

    Javvad Malik discusses the issues he found to be top of mind of cybersecurity professionals during Infosecurity Europe 2024

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  20. CrowdStrike Windows Outage: What We Can Learn

    ISACA’s Divya Aradhya sets out lessons software providers and end users can learn from the CrowdStrike Windows Outage on July 19

    1. Photo of Divya Aradhya

      Divya Aradhya

      Head of Cyber Architecture for Banking & International, Citi

What’s hot on Infosecurity Magazine?