Infosecurity Blogs

  1. Capitalizing on a Crisis: What Global Events Mean for Cybersecurity

    Cyber threats emanating from the Russia Ukraine are widespread and indiscriminate, and organizations must be prepared

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  2. OWASP Shines Light on Three New Risk Categories

    Security teams must consider the new categories when looking to protect against today’s application security risks

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  3. Cloud Services Are Increasingly Exploited for Command and Control in Cyber Espionage Operations

    Threat actors are making the most of cloud services for malicious purposes, so organizations should do the same for their security

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  4. OWASP Gives App Security a Fresh Look

    Non-profit revamps methodology for top 10 list to reflect new risks and challenges posed by remote work

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  5. Credential Harvesting and Initial Access: What Are They and How Can I Hit Back?

    Credential theft is a key element of initial access, and security teams must spot and respond to such activity rapidly

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  6. Time to Gear Up Your Company's Cybersecurity

    It's becoming impossible to ignore the need for additional layers of security

    1. Photo of Zack  Fair

      Zack Fair

      Product Manager, SafeDNS

  7. Why We Expect More Multi-Level Extortion (And What to Do About It)

    Why it matters to small to mid-sized enterprises and what IT and Security stakeholders can do about it

    1. Photo of Will Ehgoetz

      Will Ehgoetz

      Manager, Threat Hunting Team, ActZero

  8. Ransomware Is On The Rise: Here’s How To Stay Protected

    Ransomware is a mounting threat, but that doesn’t have to mean your organization is the next to be breached

    1. Photo of Isa Jones

      Isa Jones

      Content Writer, Secure Link

  9. Understanding DDoS Protection Options

    It's vital to understand the topology, advantages and disadvantages of different DDoS protection options

    1. Photo of Ziv Gadot

      Ziv Gadot

      CEO, Red Button

  10. Let’s Go Bold in Pursuit of Cyber Talent

    From both recruitment and retention standpoints, there is much companies can do to calibrate their approaches for current realities

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  11. How Threat Hunting Evolved In 2021

    Threat hunting has been pushing to new limits since 2021, but what are the major developments that have allowed it to thrive?

    1. Photo of Bernadine Racoma

      Bernadine Racoma

      Content Manager, WorkSmartr

  12. Emotet Is Back and Is Deadlier Than Ever! A Rundown of the Emotet Malware

    Despite the dangers, businesses can protect their servers from being infected with proper precaution

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  13. HEAT: Are Companies Prepared for Modern Threats?

    To deal with HEAT, security strategies today can no longer be founded in detection and remediation

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  14. Protecting Industrial Organizations From Ransomware

    Industrial networks are far more connected than ever, which has significantly increased security stakes

    1. Photo of Tony Atkins

      Tony Atkins

      Account Manager, UK & EU, Dragos

  15. The Digital Heatwave: Understanding Highly Adaptive Evasive Threats

    To stop HEAT attacks and limit the devastating effects of ransomware, security teams need to update their defenses

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  16. How to Navigate the Complexity of SaaS Management

    Why a comprehensive SaaS management solution is imperative for business success

    1. Photo of Oleg Mogilevsky

      Oleg Mogilevsky

      Senior Product Marketing Manager, Axonius SaaS Management, Axonius

  17. The Rise of VR and the Transformation of the Cybersecurity Capability

    Designing cybersecurity of the future requires a willingness to explore how technology trends manifest

    1. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

  18. Serverless Applications Pose Unique Challenges for Security Testing

    To actualize the benefits of serverless applications, organizations need purpose-built application testing

    1. Photo of Blake Connell

      Blake Connell

      Director of Product Marketing, Contrast Security

  19. Tales from the SOC: Inactive Account Exploitation

    How did the SOC team react when a malicious threat actor gained credentials of an ex-employee?

    1. SOC Team

      AT&T Cybersecurity

  20. Why Multi-Factor Authentication Isn't Enough To Secure Enterprises

    Why the best security is knowledge and understanding coupled with layers of technical security

    1. Photo of David Greene

      David Greene

      Director of Product Development, Secure Link

What’s hot on Infosecurity Magazine?