Infosecurity Blogs

  1. Looking Back at the Mega Breaches Trends of 2022

    Paolo Passeri looks back at data on mega breaches that took place in 2022

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  2. Are You Prioritizing Digital Identity Management?

    Understand the measures organizations can put in place to ensure the security of their digital infrastructure and regain control over employees’ digital identities

    1. Francesco Basso

      Product Manager, Actalis

  3. Why Zero Trust Isn’t a Silver Bullet for Security

    It is important for organizations to recognize the limits of zero trust as they implement their security strategies

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  4. Uncover the Default Passwords Lurking in Your Active Directory

    Understand how default passwords can be present in an Active Directory and provides instructions on how to check for them and how to remove them

    1. Photo of John Ward

      John Ward

      Cybersecurity Writer, Specops Software – An Outpost24 Company

  5. 2022: DDoS Year-in-Review

    StormWall’s DDoS Year-in-Review report takes a look at the 2022 threat landscape, breaks down the industries that were most affected, and explores current DDoS trends

  6. Not All E-Signatures Are Created Equal – Don't Get Caught Out

    EU eIDAS regulation sets out three distinct types of e-signatures. Each of them has unique traits that affect their legality and enforceability. This article examines how they differ.

    1. Francesco Basso

      Product Manager, Actalis

  7. ChatGPT: A New Wave of Cybersecurity Concerns?

    Javvad Malik discusses the cyber threats that will emanate from ChatGPT and how these risks can be mitigated

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  8. It’s Time to Put Your Users at The Centre of Your Security Universe

    Ensure your users are security-aware in the face of today's evolving threats

    1. Photo of Aaron Webb

      Aaron Webb

      Senior Product Marketing Manager, Security, Jamf

  9. Template Injection Attacks: Nefarious Actors Lie in Wait in North Korea

    Brett Raybould discusses how TTPs used by North Korean threat actors are similar to previous malicious campaigns

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  10. Prioritize the Prevention Part of Security Programs in 2023

    Rob Clyde argues that with savvy leadership, 2023 can be a great year for security teams despite tightening budgets

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  11. How to Erase Data Securely From Hard Drives and SSDs, Including NVMe

    In this blog, Stellar will look at the different methods of data erasure and explore how to erase data securely from hard drives and SSDs, including NVMe

    1. Photo of Namrata Sengupta

      Namrata Sengupta

      Vice President, Stellar Data Recovery Inc., Stellar

  12. How to Find Out if Your Data is Being Sold to a Third Party

    Find out how you can tell if you data is being sold by a third party and what to do about it

    1. Photo of Federico Morelli

      Federico Morelli

      Content Manager, Incogni

  13. How Restrictive Laws Are Pushing Chinese Cyber-Criminals Towards Novel Monetization Techniques

    Jason Steer highlights novel techniques being used by Chinese cyber-criminals in the face of a cybercrime crackdown by the CCP

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  14. Are Business Logic Flaws Leaving Your APIs at Risk?

    Attackers don't need to hack the API. They discover inherent business logic issues and exploit vulnerabilities like Broken Object Level Authorization (BOLA)

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  15. Repair and Recover Data from Corrupt Outlook PST Files with Outlook PST Recovery Software

    Understand the steps to repair and recover data from corrupt Outlook PST files using SCANPST and a third-party Outlook PST repair software.

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  16. The Issue of Overreliance on Detection Solutions in the Security Stack

    Relying solely on detection puts you on the back foot, forcing you to react to threat actors once they’re already on the network

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  17. Infosecurity Magazine’s Top Stories 2022

    Take a look at Infosecurity’s most-read stories of 2022 in this top 10 run-down

  18. The Top Security Vulnerabilities of 2022 and Their Workarounds

    Harman Singh outlines the top security vulnerabilities organizations should be aware of from 2022

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  19. New Year, New Problems: Why 2023 Could be Another Turbulent Time for Cybersecurity

    Adenike Cosgrove sets out her cybersecurity predictions for 2023

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  20. Cybersecurity: Trends From 2022 and Predictions For 2023

    This review of 2022 examines remote working, supply chain security and regulations

    1. Photo of Joel Burleson-Davis

      Joel Burleson-Davis

      SVP Worldwide Engineering, Cyber, Imprivata

What’s Hot on Infosecurity Magazine?