Infosecurity Blogs

Modern Authentication for Multiple User Journeys - Best Guidance
If implemented properly, modern authentication can secure a growing attack surface and avoid security burnout

Cyber Essential’s Password-Based Authentication Requirements
Cyber Essentials revised its password-based authentication requirements in 2022 as a response to the ever-changing threat landscape

Let’s Rethink Cybersecurity Training Investment
We need to make training targeted to tasks we can realistically expect people to do

2022: A Checklist for the Year of Heightened Cyber Risk
Harman Singh sets out steps organizations need to take to protect themselves amid heightened cyber-risks

What Law Firms Need to Know About Cybersecurity
Why law firms must put proactive security measures in place to detect and prevent data breaches

Cybercrime: A Clear and Present Danger
Organizations need to rapidly respond to threats that strike throughout their entire network infrastructure

Travel and Hospitality Fraud is Growing: Here’s How it Works
An underground market has developed around hospitality and travel fraud, and organizations and consumers must be aware

How Threat Actors Weaponize Your Trust
Trust is one of the preferred weapons of any criminals, and organizations should adapt their security with this in mind

A Smarter Cyber-Risk Management Strategy
Why you must integrate cyber-resilience into digital risk assurance programs tailored to the business

New VIP3R Campaign Highlights the Dangers of Spearphishing
A unique spearphishing campaign, VIP3R, highlights the growing sophistication of these types of threats

A Practical Lesson in Collaborative Security
Collaboration is important to mitigating risk, remediating vulnerabilities and reaching compliance

Empathy: The Overlooked Ingredient in Cybersecurity
The cybersecurity industry needs to embrace empathy and honesty to help keep pace with cyber-threats

Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts
Worryingly, companies still rely on conventional solutions to assess bots

Tackling the Emerging Threat of Session Hijacking and MFA Bypass
Cyber-criminals are finding ways to bypass MFA - how can organizations respond?

What Does Zero Trust Mean for MSPs?
MSPs benefit from zero trust because it implies a long-term relationship with customers

Unraveling the Challenges of Log4j
Log4j is particularly dangerous, so what is the solution in combatting it?

Why Remote Access in Manufacturing is a Dangerous Game
Any investment in securing third-party access points is an investment in the greater good of your organization

Celebrating a New Era for Infosecurity Europe and Cyber House Party
For the first time, Cyber House Party will be held during Infosecurity Europe, on Wednesday June 22

Protecting All Users Is What's Next for MFA
Truly increasing MFA adoption requires a more fundamental shift in the organization’s security posture

Phishing Takeaways from the Conti Ransomware Leaks
Phishing-related takeaways Cofense Intelligence analysts discovered in the Conti leaks



















