Infosecurity Blogs

  1. What Law Firms Need to Know About Cybersecurity

    Why law firms must put proactive security measures in place to detect and prevent data breaches

    1. Photo of Tori Taylor

      Tori Taylor

      Marketing Communications Specialist, SecureLink

  2. Cybercrime: A Clear and Present Danger

    Organizations need to rapidly respond to threats that strike throughout their entire network infrastructure

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  3. Travel and Hospitality Fraud is Growing: Here’s How it Works

    An underground market has developed around hospitality and travel fraud, and organizations and consumers must be aware

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  4. How Threat Actors Weaponize Your Trust

    Trust is one of the preferred weapons of any criminals, and organizations should adapt their security with this in mind

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  5. A Smarter Cyber-Risk Management Strategy

    Why you must integrate cyber-resilience into digital risk assurance programs tailored to the business

    1. Photo of Rob Acker

      Rob Acker

      ICT Technical Manager, LRQA

  6. New VIP3R Campaign Highlights the Dangers of Spearphishing

    A unique spearphishing campaign, VIP3R, highlights the growing sophistication of these types of threats

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  7. A Practical Lesson in Collaborative Security

    Collaboration is important to mitigating risk, remediating vulnerabilities and reaching compliance

    1. Photo of Yael Shasha

      Yael Shasha

      Director of Customer Experience, ActZero

  8. Empathy: The Overlooked Ingredient in Cybersecurity

    The cybersecurity industry needs to embrace empathy and honesty to help keep pace with cyber-threats

    1. Photo of Melissa Elza

      Melissa Elza

      vCPO, principal partner, HoneyBee HR

    2. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

  9. Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts

    Worryingly, companies still rely on conventional solutions to assess bots

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  10. Tackling the Emerging Threat of Session Hijacking and MFA Bypass

    Cyber-criminals are finding ways to bypass MFA - how can organizations respond?

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  11. What Does Zero Trust Mean for MSPs?

    MSPs benefit from zero trust because it implies a long-term relationship with customers

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  12. Unraveling the Challenges of Log4j

    Log4j is particularly dangerous, so what is the solution in combatting it?

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  13. Why Remote Access in Manufacturing is a Dangerous Game

    Any investment in securing third-party access points is an investment in the greater good of your organization

    1. Photo of Russell Dowdell

      Russell Dowdell

      Senior Manager, Product Management, SecureLink

  14. Celebrating a New Era for Infosecurity Europe and Cyber House Party

    For the first time, Cyber House Party will be held during Infosecurity Europe, on Wednesday June 22

  15. Protecting All Users Is What's Next for MFA

    Truly increasing MFA adoption requires a more fundamental shift in the organization’s security posture

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  16. Phishing Takeaways from the Conti Ransomware Leaks

    Phishing-related takeaways Cofense Intelligence analysts discovered in the Conti leaks

    1. Photo of Brad Haas

      Brad Haas

      Cyber Threat Intelligence Analyst, Cofense

  17. GDPR and Google Analytics – Privacy Concerns and Compliance Steps

    Harman Singh explains how organizations can ensure they follow GDPR rules using Google Analytics

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  18. I'm @InfosecEditor...Get Me Out of Here!

    Eleanor Dallaway reflects on her 15 years as Infosecurity Magazine Editor and announces that it’s time for someone else to take a spin in the editor’s chair.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  19. New OWASP Top 10: Beware of Poor Security Practices

    The OWASP Top 10 list, with good security practices and solutions, makes it easier to enforce better security posture

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  20. Why “Shields Up” Starts with Understanding and Protecting the Attack Surface

    With the threat of en masse cyber-attacks from Russia, organizations should develop a 'Shields Up' security strategy

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

What’s hot on Infosecurity Magazine?