Infosecurity Blogs
What Law Firms Need to Know About Cybersecurity
Why law firms must put proactive security measures in place to detect and prevent data breaches
Cybercrime: A Clear and Present Danger
Organizations need to rapidly respond to threats that strike throughout their entire network infrastructure
Travel and Hospitality Fraud is Growing: Here’s How it Works
An underground market has developed around hospitality and travel fraud, and organizations and consumers must be aware
How Threat Actors Weaponize Your Trust
Trust is one of the preferred weapons of any criminals, and organizations should adapt their security with this in mind
A Smarter Cyber-Risk Management Strategy
Why you must integrate cyber-resilience into digital risk assurance programs tailored to the business
New VIP3R Campaign Highlights the Dangers of Spearphishing
A unique spearphishing campaign, VIP3R, highlights the growing sophistication of these types of threats
A Practical Lesson in Collaborative Security
Collaboration is important to mitigating risk, remediating vulnerabilities and reaching compliance
Empathy: The Overlooked Ingredient in Cybersecurity
The cybersecurity industry needs to embrace empathy and honesty to help keep pace with cyber-threats
Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts
Worryingly, companies still rely on conventional solutions to assess bots
Tackling the Emerging Threat of Session Hijacking and MFA Bypass
Cyber-criminals are finding ways to bypass MFA - how can organizations respond?
What Does Zero Trust Mean for MSPs?
MSPs benefit from zero trust because it implies a long-term relationship with customers
Unraveling the Challenges of Log4j
Log4j is particularly dangerous, so what is the solution in combatting it?
Why Remote Access in Manufacturing is a Dangerous Game
Any investment in securing third-party access points is an investment in the greater good of your organization
Celebrating a New Era for Infosecurity Europe and Cyber House Party
For the first time, Cyber House Party will be held during Infosecurity Europe, on Wednesday June 22
Protecting All Users Is What's Next for MFA
Truly increasing MFA adoption requires a more fundamental shift in the organization’s security posture
Phishing Takeaways from the Conti Ransomware Leaks
Phishing-related takeaways Cofense Intelligence analysts discovered in the Conti leaks
GDPR and Google Analytics – Privacy Concerns and Compliance Steps
Harman Singh explains how organizations can ensure they follow GDPR rules using Google Analytics
I'm @InfosecEditor...Get Me Out of Here!
Eleanor Dallaway reflects on her 15 years as Infosecurity Magazine Editor and announces that it’s time for someone else to take a spin in the editor’s chair.
New OWASP Top 10: Beware of Poor Security Practices
The OWASP Top 10 list, with good security practices and solutions, makes it easier to enforce better security posture
Why “Shields Up” Starts with Understanding and Protecting the Attack Surface
With the threat of en masse cyber-attacks from Russia, organizations should develop a 'Shields Up' security strategy