Infosecurity Blogs

  1. Bridging the IT, Security and Developer Divide to Deliver Innovation at Speed

    How the gulf between IT, security and development can be bridged to deliver faster innovation

    1. Photo of Scott McKinnon

      Scott McKinnon

      Principal Security Architect, VMware

  2. Cybersecurity is Critical at Christmas – Here's Why

    Rising online shopping is providing a huge opportunity for cyber-attackers

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  3. Shifting Left with Pre-Commit Hooks

    Why shifting-left means less burden on security shoulders and improved time to remediate

    1. Photo of Thomas Segura

      Thomas Segura

      Content Writer, GitGuardian

  4. This Holiday Season, Don't Forget to Prepare Your Organization for Cyber-Threats

    Cyber-attacks during holidays are preventable with an effective, intelligent and managed security solution

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  5. Ransomware is Everywhere, But are Organizations’ Defenses too Little, too Late?

    With ransomware becoming more prevalent, cyber defenses need to evolve beyond tools and focus on end-user behaviors

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  6. Recognizing the Importance of Operational Security

    Rob Acker explains why effective operational security has never been more important

    1. Photo of Rob Acker

      Rob Acker

      ICT Technical Manager, LRQA

  7. SEO Poisoning: The New Normal Brings New Threats

    SEO poisoning demonstrates the acknowledgment of attackers that remote and hybrid business models have resulted in increased use of the browser

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  8. Gearing Up for Another Cyber House Party Christmas

    Next week sees the return of the popular Cyber House Party Christmas Bash!

  9. Growing Pain Points in Hybrid Cloud

    Businesses should focus on two critical areas: 5G “garbage collection” and shadow cloud

    1. Photo of William Malik

      William Malik

      VP of Infrastructure Strategies, Trend Micro

  10. Firewalls and Security Protocols Alone Cannot Keep Hackers Out

    Enterprises need a solution to help secure personal data for business use while not placing it at risk of theft

    1. Photo of Keunjin Kim

      Keunjin Kim

      Founder and CEO, Spiceware

  11. Cloud Accounts: A Growing Target for Opportunistic and State-Sponsored Threat Actors

    With users being the new perimeter, attackers are focusing their efforts on cloud identities

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  12. Improve Visibility for a Secure Cloud Migration

    Why a security services platform is the solution IT and developer teams need

    1. Photo of Andrew Stevens

      Andrew Stevens

      Director of Product Marketing, Trend Micro

  13. Scanning Docker Images for Secrets

    Owing to their structure and usage, docker images are likely to contain hidden secrets

    1. Photo of Thomas Segura

      Thomas Segura

      Content Writer, GitGuardian

  14. Education Could Be the Test for Cyber-Attackers

    Why education institutions are vulnerable to data loss and theft and a tempting target for hackers

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  15. #BlackFriday: The Holidays Are Around the Corner, and so Are the Scammers!

    Javvad Malik offers advice to online shoppers about how to stay secure over the upcoming shopping season

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  16. Serverless and Application Security

    Why organizations need a comprehensive, purpose-built tool for serverless security

    1. Photo of Tal Melamed

      Tal Melamed

      Senior Director, Cloud Native Security Research, Contrast Security

  17. Cloud Security Posture Management (CSPM) Is Insufficient Without Visibility

    CSPM is critical, but security teams need additional visibility and improved accuracy

    1. Photo of Kurt Van Etten

      Kurt Van Etten

      Chief Product Officer, RedSeal

  18. FISMA Requirements: Are You Compliant?

    Why complying with FISMA also extends into data destruction and device disposal practices

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  19. Simplifying Cloud Compliance Through Automation

    In the cloud computing world, conforming to compliance standards and regulations sets you up for success

    1. Photo of Andrew Stevens

      Andrew Stevens

      Director of Product Marketing, Trend Micro

What’s hot on Infosecurity Magazine?