Infosecurity Blogs

  1. Observing the Changing Nature of Security within Organizations

    Understand why an organization's security posture must align with business objectives

    1. Photo of Rich Foltak

      Rich Foltak

      CISO, Dito

  2. Fixing Our Breaking Human Controls

    Jenai Marinkovic argues that more empathy is required to mitigate cyber-threats

    1. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

  3. How to Solve Third-Party Remote Access Problems in Manufacturing

    Under Industry 4.0 securing OT, ICS and PLC systems is more important than ever before

    1. Photo of Tori Taylor

      Tori Taylor

      Marketing Communications Specialist, SecureLink

  4. The Role of Cloud Services in the Hybrid War in Ukraine

    Threat actors linked to the Russia-Ukraine war are increasingly seeking to exploit cloud services

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  5. Outsourcing Cyber Risk: Why an Integrated Approach is Critical

    While many organisations are looking for a silver bullet to combat all threats, there is no such thing as a one-size-fits-all approach

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  6. Looking East: Japanese Credit Card Customers Targeted With Phishing Attacks

    The threat actor was likely to have been of Chinese origin

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  7. The Challenge of Shadow OT

    No matter how your ICS/OT environment is connected, it needs to be secured

    1. Photo of Paul Holland

      Paul Holland

      Cyber Capability Manager, Royal Mail

  8. Keeping up with the Attackers: Educating Staff on New Monkeypox Themed Phishing Campaigns

    Threat actors exploit public wariness surrounding new medical concerns

    1. Elmer Hernandez

      Threat analyst, Cofense

  9. How Russian Information Operations Are Trying to Win the War

    A whole-of-community response is required to counter Russian attempts to undermine and divide the Western coalition

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  10. Rise in Ransomware: Exploring the Driving factors

    Ransomware attacks continue to dominate headlines and are on the rise

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  11. Hello From Your New Editor

    A quick introduction from the new editor at Infosecurity Magazine

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  12. A Guide to User Access Monitoring and Why it is Important

    Third-party user access monitoring is vital but is often overlooked or carried out manually

    1. Photo of Tori Taylor

      Tori Taylor

      Marketing Communications Specialist, SecureLink

  13. An Inside Look at Hive’s RaaS Tactics

    The Hive group's aggressive tactics and regular variant upgrades make it a formidable adversary

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  14. Compliance vs Security: A Look into Passwords

    New research shows that relying on compliant passwords does nothing to protect your network

    1. Photo of John Ward

      John Ward

      Cybersecurity Writer, Specops Software – An Outpost24 Company

  15. Digital Trust: From Brand Damaging to Brand Managing

    How can organizations achieve consumer confidence in their security and privacy posture?

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  16. What You Should Do When Two-Factor Authentication Becomes a Security Requirement

    The desire for enhanced digital security has caught the attention of governments around the world, all looking to protect consumers and businesses

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  17. How Ransomware Has Become a Geopolitical Risk for Governments

    There has been a significant escalation in attacks targeting government organizations this year

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  18. The Industrial Cyber-Attack Evolution: How to Keep Your Network Safe

    Industrial organizations face growing cyber threats - how can they stay one step ahead of the attackers?

    1. Photo of Daniel dos Santos

      Daniel dos Santos

      head of security research, Forescout

  19. Stand Down, Marketers: Zero Trust is Not a Product

    If correctly understood and carefully implemented, zero trust has a huge amount to offer organizations of every size

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  20. Browser exploits: A Concerning Revival Led by the Lazarus Group

    The notorious Lazarus group is spearheading growing efforts to leverage zero-day vulnerabilities in the browser

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

What’s Hot on Infosecurity Magazine?