Infosecurity Blogs
Browser exploits: A Concerning Revival Led by the Lazarus Group
The notorious Lazarus group is spearheading growing efforts to leverage zero-day vulnerabilities in the browser
Modern Authentication for Multiple User Journeys - Best Guidance
If implemented properly, modern authentication can secure a growing attack surface and avoid security burnout
Cyber Essential’s Password-Based Authentication Requirements
Cyber Essentials revised its password-based authentication requirements in 2022 as a response to the ever-changing threat landscape
Let’s Rethink Cybersecurity Training Investment
We need to make training targeted to tasks we can realistically expect people to do
2022: A Checklist for the Year of Heightened Cyber Risk
Harman Singh sets out steps organizations need to take to protect themselves amid heightened cyber-risks
What Law Firms Need to Know About Cybersecurity
Why law firms must put proactive security measures in place to detect and prevent data breaches
Cybercrime: A Clear and Present Danger
Organizations need to rapidly respond to threats that strike throughout their entire network infrastructure
Travel and Hospitality Fraud is Growing: Here’s How it Works
An underground market has developed around hospitality and travel fraud, and organizations and consumers must be aware
How Threat Actors Weaponize Your Trust
Trust is one of the preferred weapons of any criminals, and organizations should adapt their security with this in mind
A Smarter Cyber-Risk Management Strategy
Why you must integrate cyber-resilience into digital risk assurance programs tailored to the business
New VIP3R Campaign Highlights the Dangers of Spearphishing
A unique spearphishing campaign, VIP3R, highlights the growing sophistication of these types of threats
A Practical Lesson in Collaborative Security
Collaboration is important to mitigating risk, remediating vulnerabilities and reaching compliance
Empathy: The Overlooked Ingredient in Cybersecurity
The cybersecurity industry needs to embrace empathy and honesty to help keep pace with cyber-threats
Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts
Worryingly, companies still rely on conventional solutions to assess bots
Tackling the Emerging Threat of Session Hijacking and MFA Bypass
Cyber-criminals are finding ways to bypass MFA - how can organizations respond?
What Does Zero Trust Mean for MSPs?
MSPs benefit from zero trust because it implies a long-term relationship with customers
Unraveling the Challenges of Log4j
Log4j is particularly dangerous, so what is the solution in combatting it?
Why Remote Access in Manufacturing is a Dangerous Game
Any investment in securing third-party access points is an investment in the greater good of your organization
Celebrating a New Era for Infosecurity Europe and Cyber House Party
For the first time, Cyber House Party will be held during Infosecurity Europe, on Wednesday June 22
Protecting All Users Is What's Next for MFA
Truly increasing MFA adoption requires a more fundamental shift in the organization’s security posture