Infosecurity Blogs

  1. The Rise of Device Encryption

    Company-wide encryption of data is being increasingly recognized as a straightforward way of mitigating the risk of data breach

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  2. Parting Shots From Former Editor, Michael Hill

    Former Infosecurity Editor, Michael Hill, reflects on his time at Infosecurity Magazine

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  3. 6 Important Questions About Anomaly Detection

    Anomaly detection is vital in identifying activity that does not conform to an expected pattern. But what is it?

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  4. Smishing: Analyzing Sophisticated Scam Methods

    The rise of more sophisticated smishing methods has exacerbated the growing threat environment

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  5. Hello From Your New Deputy Editor

    Our new deputy editor introduces himself and explains why he joined Infosecurity Magazine

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  6. Proactive Approach to Soft Skills Gap Needed in Security Industry

    There are huge opportunities in the security industry for those who develop their soft skills

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  7. Defining Cybersecurity in a Hybrid World

    As many employees return to the office, what security issues do organizations need to focus on?

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  8. Securing Containers: Seven Key Concerns and What to Do About Them

    When building out a security strategy for containers, there are generally seven primary concerns. This article explains what they are, and what to do

    1. Security Researcher

      Trend Micro

  9. Here’s What Universities Need to Know About Cyber-Attacks

    A recent spate of ransomware attacks, suggests that cyber-criminals are taking advantage of the weaknesses of the new hybrid learning model at Universities. Here are three lessons universities need to quickly learn to avoid falling victim to devastating cyber-attacks

    1. Photo of Jonathan Lee

      Jonathan Lee

      Director of Public Sector, Sophos

  10. A Prequel to Ransomware

    How should orgs react to ransomware incidents?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  11. Misconfigurations are the Biggest Threat to Cloud Security: Here's What to Do

    Four ways to protect against cloud security misconfigurations, the biggest threat to cloud security

    1. Photo of Greg Young

      Greg Young

      Vice President for Cybersecurity, Trend Micro

  12. Why are Companies Still Struggling to Support Safe Remote Working?

    Remote workers continue to pose a major threat to data security, more than a year after the office exodus that caught many companies off guard. Jon Fielding investigates

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  13. The Digital Training Revolution and Mass Mandatory ‘Modulation’

    The effectiveness of digital training is greatly improved with appropriate supervision and leadership

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  14. Top 5 Attacks in Commonly Used SaaS Apps

    One of the most prevalent places for a company leak or breach has to do with misconfigurations found in an organization's SaaS apps. Here are five examples from real-world attacks.

    1. Photo of Maor  Bin

      Maor Bin

      CEO & Co-Founder, Adaptive Shield

  15. The Expanding Scope and Complexity of Credentials Phishing

    How should orgs combat the rise in credential phishing attacks?

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  16. Security in the Cloud: Where Your Responsibility Begins and the Cloud Provider's Ends

    Cloud computing has revolutionized the IT world, so resources in the cloud must be safer, right? Wrong.

    1. Security Researcher

      Trend Micro

  17. Overcoming The Challenges of Emerging Technology

    How can security pros stay informed about emerging technologies?

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  18. The Dystopic Future of Cybersecurity and the Importance of Empowering CISOs

    Vanessa Pegueros explores the importance of empowering CISOs facing the ever-traumatizing threats of cybercrime

    1. Photo of Vanessa  Pegueros

      Vanessa Pegueros

      Chief Trust & Security Officer, OneLogin

  19. CISO Stories: Part Two

    This is the story of Boris, CISO at an international charity

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  20. Misconfigurations are Mistakes: Eliminate the Biggest Vulnerability in Cloud Services

    Mark Nunnikhoven argues that organizations should be pushing to move faster to the cloud in order to improve their security

    1. Security Researcher

      Trend Micro

What’s hot on Infosecurity Magazine?