Infosecurity Blogs

  1. Serverless and Application Security

    Why organizations need a comprehensive, purpose-built tool for serverless security

    1. Photo of Tal Melamed

      Tal Melamed

      Senior Director, Cloud Native Security Research, Contrast Security

  2. FISMA Requirements: Are You Compliant?

    Why complying with FISMA also extends into data destruction and device disposal practices

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  3. Simplifying Cloud Compliance Through Automation

    In the cloud computing world, conforming to compliance standards and regulations sets you up for success

    1. Photo of Andrew Stevens

      Andrew Stevens

      Director of Product Marketing, Trend Micro

  4. UK GDPR Post-Brexit: Everything You Need to Know

    Harman Singh sets out the implications of the UK's new data protection regime post-Brexit

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  5. Overcoming the 3 Biggest Challenges in System Hardening

    Why it's essential an organization picks the right approach to system hardening – automated or non-automated

    1. Photo of Keren Pollack

      Keren Pollack

      Marketing Manager, CalCom

  6. Post-pandemic Growth Starts With Understanding Cyber Risk

    Only a security-by-design culture can enable organizations to deliver digital innovation projects effectively

    1. Photo of Bharat Mistry

      Bharat Mistry

      Technical Director for UK and Ireland, Trend Micro

  7. Why Cloud Security Posture Management Is Essential to Your Overall Security Plan

    CSPM is quickly becoming the best way to close the gaps in your security posture

    1. Photo of Mike Lloyd

      Mike Lloyd

      CTO of RedSeal

  8. Four Reasons Why Application Security is an Enabler for All Businesses

    Vinugayathri Chinnasamy shares four undeniable reasons why application security is a business enabler

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  9. Automating Cloud Security

    Why an automated cloud-native security solution can help save your organization time, money and frustration

    1. Photo of Andrew Stevens

      Andrew Stevens

      Director of Product Marketing, Trend Micro

  10. The NSA EPL: The Policy that Protects Your Data

    Why the NSA EPL has the specifications that ensure all data has a proper end-of-life solution

    1. Photo of Paul Falcone

      Paul Falcone

      Marketing Coordinator, SEM

  11. Hybrid Working: Stopping Cyber-Attacks at Source

    How can organizations tackle the challenges associated with hybrid and remote working?

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  12. Protecting Your New Home In The Cloud

    With the proper security strategy and solution, you can transition to the cloud smoothly and confidently

    1. Photo of Andrew Stevens

      Andrew Stevens

      Director of Product Marketing, Trend Micro

  13. Cybersecurity, GRC and Auditing Intelligent Systems

    ML models and their outputs must, at every single stage, be explained in a way that is interpretable or understandable to an average person

    1. Photo of Margarita Azizyan

      Margarita Azizyan

      security consultant and researcher, Tiro Security

    2. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

  14. Classification Breakdown: Match Your Data to its Destruction Method

    Whether destroying personally identifiable or top secret information, adopt proper data sanitization

    1. Photo of Amanda Canale

      Amanda Canale

      Marketing Assistant, SEM

  15. Improving Security for Amazon S3 Buckets

    Avoid post-deployment headaches by increasing the security of your Amazon S3 buckets

    1. Photo of Fernando  Cardoso

      Fernando Cardoso

      Solution Architect for AWS Alliance, Trend Micro

  16. The New MFA To Secure All Employees In A Hybrid World

    SIM authentication is cryptographically secure, easy to implement, and effortless to use

    1. Photo of Paul McGuire

      Paul McGuire

      CEO, tru.ID

  17. Why Data Centers Need to Know About GLBA Compliance

    Under GLBA there must be a plan and personnel in place to oversee data destruction when data has reached its end-of-life

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  18. Streamline Scanning and Encryption of Objects in S3 Buckets

    Organizations need cloud-native security that helps them meet compliance requirements and protect their cloud ecosystem

    1. Photo of Meihua Chen

      Meihua Chen

      Product Manager, Trend Micro

  19. Mitigating Cybersecurity Risks of Mergers and Acquisitions

    A carefully developed plan for identity and access management is essential to keep cyber attackers at bay

    1. Photo of Sean Deuby

      Sean Deuby

      director of services, Semperis

  20. Hybrid Attacks Are Threatening Hybrid Work Through the Cloud

    The novelty of conducting business through the cloud is exposing users to hybrid phishing attempts

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

What’s Hot on Infosecurity Magazine?