Infosecurity Blogs
Ransomware is Everywhere, But are Organizations’ Defenses too Little, too Late?
With ransomware becoming more prevalent, cyber defenses need to evolve beyond tools and focus on end-user behaviors
Recognizing the Importance of Operational Security
Rob Acker explains why effective operational security has never been more important
SEO Poisoning: The New Normal Brings New Threats
SEO poisoning demonstrates the acknowledgment of attackers that remote and hybrid business models have resulted in increased use of the browser
Gearing Up for Another Cyber House Party Christmas
Next week sees the return of the popular Cyber House Party Christmas Bash!
Growing Pain Points in Hybrid Cloud
Businesses should focus on two critical areas: 5G “garbage collection” and shadow cloud
Firewalls and Security Protocols Alone Cannot Keep Hackers Out
Enterprises need a solution to help secure personal data for business use while not placing it at risk of theft
Cloud Accounts: A Growing Target for Opportunistic and State-Sponsored Threat Actors
With users being the new perimeter, attackers are focusing their efforts on cloud identities
Improve Visibility for a Secure Cloud Migration
Why a security services platform is the solution IT and developer teams need
Scanning Docker Images for Secrets
Owing to their structure and usage, docker images are likely to contain hidden secrets
Education Could Be the Test for Cyber-Attackers
Why education institutions are vulnerable to data loss and theft and a tempting target for hackers
#BlackFriday: The Holidays Are Around the Corner, and so Are the Scammers!
Javvad Malik offers advice to online shoppers about how to stay secure over the upcoming shopping season
Serverless and Application Security
Why organizations need a comprehensive, purpose-built tool for serverless security
Cloud Security Posture Management (CSPM) Is Insufficient Without Visibility
CSPM is critical, but security teams need additional visibility and improved accuracy
FISMA Requirements: Are You Compliant?
Why complying with FISMA also extends into data destruction and device disposal practices
Simplifying Cloud Compliance Through Automation
In the cloud computing world, conforming to compliance standards and regulations sets you up for success
UK GDPR Post-Brexit: Everything You Need to Know
Harman Singh sets out the implications of the UK's new data protection regime post-Brexit
Overcoming the 3 Biggest Challenges in System Hardening
Why it's essential an organization picks the right approach to system hardening – automated or non-automated
Post-pandemic Growth Starts With Understanding Cyber Risk
Only a security-by-design culture can enable organizations to deliver digital innovation projects effectively
Why Cloud Security Posture Management Is Essential to Your Overall Security Plan
CSPM is quickly becoming the best way to close the gaps in your security posture