Infosecurity Blogs

Emotet Is Back and Is Deadlier Than Ever! A Rundown of the Emotet Malware
Despite the dangers, businesses can protect their servers from being infected with proper precaution

HEAT: Are Companies Prepared for Modern Threats?
To deal with HEAT, security strategies today can no longer be founded in detection and remediation

Protecting Industrial Organizations From Ransomware
Industrial networks are far more connected than ever, which has significantly increased security stakes

The Digital Heatwave: Understanding Highly Adaptive Evasive Threats
To stop HEAT attacks and limit the devastating effects of ransomware, security teams need to update their defenses

How to Navigate the Complexity of SaaS Management
Why a comprehensive SaaS management solution is imperative for business success

The Rise of VR and the Transformation of the Cybersecurity Capability
Designing cybersecurity of the future requires a willingness to explore how technology trends manifest

Serverless Applications Pose Unique Challenges for Security Testing
To actualize the benefits of serverless applications, organizations need purpose-built application testing

Tales from the SOC: Inactive Account Exploitation
How did the SOC team react when a malicious threat actor gained credentials of an ex-employee?

Why Multi-Factor Authentication Isn't Enough To Secure Enterprises
Why the best security is knowledge and understanding coupled with layers of technical security

4 Actions to Improve DDoS Protection
Basic steps you can take to improve your protection – without requiring any professional help

What Do Secure Email Gateways and Olympic Judges Have in Common?
Why removing as much subjectivity as possible will lead to more confident outcomes and a clearer path to gold

Ransomware: A Constant Threat
How firms can eliminate much of the risk of falling victim to a ransomware attack

Three A's to Look For When Considering a SAST Tool
Three ways to lay a solid foundation to support an effective, accurate and holistic security program

The Exploitation of Cloud Services Continues in 2022
With cyber-criminals using increasingly sophisticated attack methods, organizations must evolve their security strategies

Securing the UK's Operators of Essential Services Against Cyber-Attacks
Why preparedness is one of the most important elements for an effective response

Greater IT Connection Means Greater Ransomware Risk on the Mainframe
Now is the time to recognize the risks the mainframe poses and take steps to avoid a potential disaster

Disruption 3.0 But Scams 1.0
Javvad Malik discusses the security challenges posed by the growth of Web 3.0

Five Tough Questions CEOs Should Be Asking Their CISOs
The time to ask these tough questions is before incidents occur, not in after-action reviews

Cybersecurity Compliance Still Not a Priority for Companies, IBM Survey Shows
Why cybersecurity compliance remains a driving force underlying business success

A Ransomware Outlook for 2022
The past two years have seen ransomware attacks become both more sophisticated and bolder; what trends are expected for 2022?



















