Infosecurity Blogs

  1. Why Multi-Factor Authentication Isn't Enough To Secure Enterprises

    Why the best security is knowledge and understanding coupled with layers of technical security

    1. Photo of David Greene

      David Greene

      Director of Product Development, Secure Link

  2. 4 Actions to Improve DDoS Protection

    Basic steps you can take to improve your protection – without requiring any professional help

    1. Photo of Ziv Gadot

      Ziv Gadot

      CEO, Red Button

  3. What Do Secure Email Gateways and Olympic Judges Have in Common?

    Why removing as much subjectivity as possible will lead to more confident outcomes and a clearer path to gold

    1. Photo of Megan Horner

      Megan Horner

      Director, Product Marketing, Cofense

  4. Ransomware: A Constant Threat

    How firms can eliminate much of the risk of falling victim to a ransomware attack

    1. Photo of Kirk Hayes

      Kirk Hayes

      Managing Principal Security Consultant at Nettitude - an LRQA Company

  5. Three A's to Look For When Considering a SAST Tool

    Three ways to lay a solid foundation to support an effective, accurate and holistic security program

    1. Photo of Thomas Segura

      Thomas Segura

      Content Writer, GitGuardian

  6. The Exploitation of Cloud Services Continues in 2022

    With cyber-criminals using increasingly sophisticated attack methods, organizations must evolve their security strategies

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  7. Securing the UK's Operators of Essential Services Against Cyber-Attacks

    Why preparedness is one of the most important elements for an effective response

    1. Photo of Tony Atkins

      Tony Atkins

      Account Manager, UK & EU, Dragos

  8. Greater IT Connection Means Greater Ransomware Risk on the Mainframe

    Now is the time to recognize the risks the mainframe poses and take steps to avoid a potential disaster

    1. Photo of Ray Overby

      Ray Overby

      Founder and President, Key Resources

  9. Disruption 3.0 But Scams 1.0

    Javvad Malik discusses the security challenges posed by the growth of Web 3.0

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  10. Five Tough Questions CEOs Should Be Asking Their CISOs

    The time to ask these tough questions is before incidents occur, not in after-action reviews

    1. Photo of Eyal  Wachsman

      Eyal Wachsman

      CEO and Co-Founder, Cymulate

  11. Cybersecurity Compliance Still Not a Priority for Companies, IBM Survey Shows

    Why cybersecurity compliance remains a driving force underlying business success

    1. Photo of Lakshmi Prabha

      Lakshmi Prabha

      CEO, TechDLP

  12. A Ransomware Outlook for 2022

    The past two years have seen ransomware attacks become both more sophisticated and bolder; what trends are expected for 2022?

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  13. The Vulnerability of the UK's 'Just in Time' Supply Chain

    Why the resilience of the UK’s supply chain against cybercrime can be significantly improved

    1. Photo of Phil Tonkin

      Phil Tonkin

      Senior Director of Strategy, Dragos

  14. 'Hack One, Breach Many' Is Here to Stay: How to Secure Your Third-Party Risks

    ‘Hack one, breach many’ is here to stay so secure your access points before it’s too late

    1. Photo of Isa Jones

      Isa Jones

      Content Writer, Secure Link

  15. 2022 – Predictions for the Year Ahead

    Javvad Malik reveals some of the cybersecurity trends he expects to come to fruition in 2022

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  16. 3 Reasons Why DDoS Protection Fails

    Improved DDoS skills and knowledge translate into the effects of an attack being mitigated quickly

    1. Photo of Ziv Gadot

      Ziv Gadot

      CEO, Red Button

  17. Cloud Security Best Practices: Stop Making Your Cloud Rain Shells

    With more sensitive data kept in the cloud as organizations move to cloud networks, security must be at the forefront

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  18. Mitigating Cloud Security's Greatest Risk: Exposure

    Why increasing cloud complexity is making security as challenging as ever

    1. Photo of Sukesh Garg

      Sukesh Garg

      Vice President of Products, RedSeal

  19. Why Is Data Destruction the Best Way to Impede Data Breach Risks?

    Devices no longer needed are required to be wiped permanently with a certified data sanitization tool

    1. Photo of Sunil Chandna

      Sunil Chandna

      Founder and CEO, Stellar Data Recovery

  20. Challenges of Industrial Cybersecurity

    A sense of urgency is needed to address the unique needs of OT

    1. Photo of Tony Atkins

      Tony Atkins

      Account Manager, UK & EU, Dragos

What’s hot on Infosecurity Magazine?