Infosecurity Blogs
The Rise of Device Encryption
Company-wide encryption of data is being increasingly recognized as a straightforward way of mitigating the risk of data breach
Parting Shots From Former Editor, Michael Hill
Former Infosecurity Editor, Michael Hill, reflects on his time at Infosecurity Magazine
6 Important Questions About Anomaly Detection
Anomaly detection is vital in identifying activity that does not conform to an expected pattern. But what is it?
Smishing: Analyzing Sophisticated Scam Methods
The rise of more sophisticated smishing methods has exacerbated the growing threat environment
Hello From Your New Deputy Editor
Our new deputy editor introduces himself and explains why he joined Infosecurity Magazine
Proactive Approach to Soft Skills Gap Needed in Security Industry
There are huge opportunities in the security industry for those who develop their soft skills
Defining Cybersecurity in a Hybrid World
As many employees return to the office, what security issues do organizations need to focus on?
Securing Containers: Seven Key Concerns and What to Do About Them
When building out a security strategy for containers, there are generally seven primary concerns. This article explains what they are, and what to do
Here’s What Universities Need to Know About Cyber-Attacks
A recent spate of ransomware attacks, suggests that cyber-criminals are taking advantage of the weaknesses of the new hybrid learning model at Universities. Here are three lessons universities need to quickly learn to avoid falling victim to devastating cyber-attacks
A Prequel to Ransomware
How should orgs react to ransomware incidents?
Misconfigurations are the Biggest Threat to Cloud Security: Here's What to Do
Four ways to protect against cloud security misconfigurations, the biggest threat to cloud security
Why are Companies Still Struggling to Support Safe Remote Working?
Remote workers continue to pose a major threat to data security, more than a year after the office exodus that caught many companies off guard. Jon Fielding investigates
The Digital Training Revolution and Mass Mandatory ‘Modulation’
The effectiveness of digital training is greatly improved with appropriate supervision and leadership
Top 5 Attacks in Commonly Used SaaS Apps
One of the most prevalent places for a company leak or breach has to do with misconfigurations found in an organization's SaaS apps. Here are five examples from real-world attacks.
The Expanding Scope and Complexity of Credentials Phishing
How should orgs combat the rise in credential phishing attacks?
Security in the Cloud: Where Your Responsibility Begins and the Cloud Provider's Ends
Cloud computing has revolutionized the IT world, so resources in the cloud must be safer, right? Wrong.
Overcoming The Challenges of Emerging Technology
How can security pros stay informed about emerging technologies?
The Dystopic Future of Cybersecurity and the Importance of Empowering CISOs
Vanessa Pegueros explores the importance of empowering CISOs facing the ever-traumatizing threats of cybercrime
CISO Stories: Part Two
This is the story of Boris, CISO at an international charity
Misconfigurations are Mistakes: Eliminate the Biggest Vulnerability in Cloud Services
Mark Nunnikhoven argues that organizations should be pushing to move faster to the cloud in order to improve their security