Infosecurity Blogs

  1. How to Repair Corrupt Exchange Database using the EseUtil Tool

    In this article, we explain the six steps to repair a corrupt Exchange database

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  2. Ransomware – Three Questions to Ask Your Cybersecurity Teams

    When it comes to cybersecurity threats, there are three essential questions to ask to determine how prepared you are for a ransomware attack.

    1. Photo of Kimberley Coffin

      Kimberley Coffin

      Global Technical Director, Lloyds Register

  3. Tales From the SOC: Dealing with the Dangers of Freeware

    AT&T's SOC team highlight the dangers of downloading freeware

    1. SOC Team

      AT&T Cybersecurity

  4. Embrace your Business Reality with a Strong Hybrid Cloud Strategy

    Whether fully cloud native, in the middle of a migration process or beginning the move, several benefits come from implementing a solid hybrid cloud approach

    1. Photo of Greg Young

      Greg Young

      Vice President for Cybersecurity, Trend Micro

  5. Top 5 Data Breaches in History

    The biggest, strangest and most embarrassing data breaches in history

    1. Photo of Sarah Coble

      Sarah Coble

      News Writer

  6. Ransomware: Why it is on the Rise, and How Can Companies Respond?

    A zero trust approach and isolation technology are key to preventing ransomware infections

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  7. Top Five Hacking Portrayals in Movies and TV

    What have been the best portrayals of hacking in TV and films over the years?

    1. Photo of Sarah Coble

      Sarah Coble

      News Writer

  8. How Much Do Hackers Pay for Stolen Personal Data on the Dark Web?

    Privacy Affairs investigated how the dark web market has changed and adapted since 2020. Here are some of their findings:

  9. 5 Ways to Stop Ransomware in its Tracks

    There are several key measures organizations can take to stop ransomware attacks in their tracks

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  10. Why Cloud Architectures and Configurations are Like Eating Pizza and Building Lego

    Migrating to the cloud can be full of promise, but organizations should understand what’s required in their slice of the cloud pie

    1. Photo of Raphael Bottino

      Raphael Bottino

      Solutions Architect, Trend Micro

  11. Top 5 Mobile Device Security Tips

    What five steps should organizations take to secure their employees’ mobile devices?

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  12. Zero Trust for Insider Access

    Insider access has emerged as a new threat. Implementing components of zero trust architecture can prevent internal attacks and protect networks and systems

    1. Photo of Daniel Fabbri

      Daniel Fabbri

      Chief Data Scientist, Secure Link

  13. Best Practices for Securing Your APIs

    API breaches are on the rise and are having a dramatic impact on businesses. Organizations should follow four best practice steps to protect APIs

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  14. The Next Equifax Attack...That Never Happened

    Although a cyber-attack similar to the infamous Equifax breach was thwarted, it shows the urgent need to address digital supply chain security

    1. Photo of Nethanel Gelernter

      Nethanel Gelernter

      Founder and CEO, Cyberpion

  15. Tailored Administration: A Catalyst for Zero Trust Architecture

    Zero trust architectures are important, but implementation issues persist. Fortunately, a tailored, custom administration can make it achievable

    1. Photo of Kayla Gesek

      Kayla Gesek

      Product manager, OneLogin

  16. The Rise of Initial Access Brokers

    How can orgs protect themselves against initial access brokers?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  17. Driving Efficiency with Integrated Management Systems: An OCTO Telematics Case Study

    OCTO Telematics CISO, Attilio De Bernardo, explains how his organization uses an integrated management system and certification to improve its security posture

    1. Photo of Katerina Liana

      Katerina Liana

      Lead Certification Specialist, Lloyd's Register

  18. Linux-based Malware Requires Linux Focused Cybersecurity Strategy

    Trend Micro's Erin Sindelar considers the Linux-focused cybersecrity strategy needed to tackle an increase in Linux-based malware

    1. Photo of Erin Sindelar

      Erin Sindelar

      Threat Researcher & Communicator, Trend Micro

  19. Creating a Secure Solution Development Lifecycle for Healthcare

    What is SSDLC and can this enhance the security of healthcare organizations?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

    3. Tom Stowell

      senior security risk engineer

  20. The Rise of Device Encryption

    Company-wide encryption of data is being increasingly recognized as a straightforward way of mitigating the risk of data breach

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

What’s hot on Infosecurity Magazine?