Infosecurity Blogs

  1. Emotet Is Back and Is Deadlier Than Ever! A Rundown of the Emotet Malware

    Despite the dangers, businesses can protect their servers from being infected with proper precaution

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  2. HEAT: Are Companies Prepared for Modern Threats?

    To deal with HEAT, security strategies today can no longer be founded in detection and remediation

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  3. Protecting Industrial Organizations From Ransomware

    Industrial networks are far more connected than ever, which has significantly increased security stakes

    1. Photo of Tony Atkins

      Tony Atkins

      Account Manager, UK & EU, Dragos

  4. The Digital Heatwave: Understanding Highly Adaptive Evasive Threats

    To stop HEAT attacks and limit the devastating effects of ransomware, security teams need to update their defenses

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  5. How to Navigate the Complexity of SaaS Management

    Why a comprehensive SaaS management solution is imperative for business success

    1. Photo of Oleg Mogilevsky

      Oleg Mogilevsky

      Senior Product Marketing Manager, Axonius SaaS Management, Axonius

  6. The Rise of VR and the Transformation of the Cybersecurity Capability

    Designing cybersecurity of the future requires a willingness to explore how technology trends manifest

    1. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

  7. Serverless Applications Pose Unique Challenges for Security Testing

    To actualize the benefits of serverless applications, organizations need purpose-built application testing

    1. Photo of Blake Connell

      Blake Connell

      Director of Product Marketing, Contrast Security

  8. Tales from the SOC: Inactive Account Exploitation

    How did the SOC team react when a malicious threat actor gained credentials of an ex-employee?

    1. SOC Team

      AT&T Cybersecurity

  9. Why Multi-Factor Authentication Isn't Enough To Secure Enterprises

    Why the best security is knowledge and understanding coupled with layers of technical security

    1. Photo of David Greene

      David Greene

      Director of Product Development, Secure Link

  10. 4 Actions to Improve DDoS Protection

    Basic steps you can take to improve your protection – without requiring any professional help

    1. Photo of Ziv Gadot

      Ziv Gadot

      CEO, Red Button

  11. What Do Secure Email Gateways and Olympic Judges Have in Common?

    Why removing as much subjectivity as possible will lead to more confident outcomes and a clearer path to gold

    1. Photo of Megan Horner

      Megan Horner

      Director, Product Marketing, Cofense

  12. Ransomware: A Constant Threat

    How firms can eliminate much of the risk of falling victim to a ransomware attack

    1. Photo of Kirk Hayes

      Kirk Hayes

      Managing Principal Security Consultant at Nettitude - an LRQA Company

  13. Three A's to Look For When Considering a SAST Tool

    Three ways to lay a solid foundation to support an effective, accurate and holistic security program

    1. Photo of Thomas Segura

      Thomas Segura

      Content Writer, GitGuardian

  14. The Exploitation of Cloud Services Continues in 2022

    With cyber-criminals using increasingly sophisticated attack methods, organizations must evolve their security strategies

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  15. Securing the UK's Operators of Essential Services Against Cyber-Attacks

    Why preparedness is one of the most important elements for an effective response

    1. Photo of Tony Atkins

      Tony Atkins

      Account Manager, UK & EU, Dragos

  16. Greater IT Connection Means Greater Ransomware Risk on the Mainframe

    Now is the time to recognize the risks the mainframe poses and take steps to avoid a potential disaster

    1. Photo of Ray Overby

      Ray Overby

      Founder and President, Key Resources

  17. Disruption 3.0 But Scams 1.0

    Javvad Malik discusses the security challenges posed by the growth of Web 3.0

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  18. Five Tough Questions CEOs Should Be Asking Their CISOs

    The time to ask these tough questions is before incidents occur, not in after-action reviews

    1. Photo of Eyal  Wachsman

      Eyal Wachsman

      CEO and Co-Founder, Cymulate

  19. Cybersecurity Compliance Still Not a Priority for Companies, IBM Survey Shows

    Why cybersecurity compliance remains a driving force underlying business success

    1. Photo of Lakshmi Prabha

      Lakshmi Prabha

      CEO, TechDLP

  20. A Ransomware Outlook for 2022

    The past two years have seen ransomware attacks become both more sophisticated and bolder; what trends are expected for 2022?

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

What’s Hot on Infosecurity Magazine?