Infosecurity Blogs

  1. Time for Infosec Professionals’ Imaginations to Stretch to Outer Space

    Cybersecurity must be at the heart of the development of the space sector

    1. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

  2. Six Ways to Improve Your Cyber-Resilience to Combat Cyber-Attacks

    Six tips for improving your company's cyber-resilience to combat cyber-attacks in 2021

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  3. The Benefits of Unified Physical Security Systems

    Unified security systems can greatly enhance business operations

    1. Photo of Anthonie van der Ploeg

      Anthonie van der Ploeg

      Sales Director Benelux & Nordics, Genetec

  4. The Risk of Collaboration Apps

    How have cyber-criminals exploited the rise in collaboration apps, and what can orgs do about it?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  5. How Hackers Use Cloud Services to Make Cybercrime More Profitable

    Cloud services can optimize resources, save time, increase automation, and take some of the security responsibility off of an organization’s plate.

    1. Photo of Bob McArdle

      Bob McArdle

      Director FTR - Cybercrime Research, Trend Micro

  6. The Five Strategies Users Use to Determine Phishing: Which Work and Which Don’t?

    Verizon estimates that 90% of all data breaches originate from phishing and according to the Anti Phishing Working Group, the number of phishing websites are at an all-time high right now.

    1. Photo of Robert  Lagerström

      Robert Lagerström

      Associate Professor, KTH Royal Institute of Technology & Founder, Foreseeti

  7. A Story of Human Error and Revenge

    Organizations must understand how employee stress can lead to cybersecurity errors

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  8. Too Much Trust?

    Have security pros been too relaxed about cyber-threats during the pandemic?

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  9. Addressing Burn Out in Cybersecurity Teams

    With cyber-threats increasing rapidly, what steps can be taken to help avoid burn out in security teams?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  10. Ransomware: To Pay or Not to Pay?

    Ransomware is an increasingly prevalent threat to small and medium-size business, but when is it right to pay a ransom?

    1. Photo of Kris Schulze

      Kris Schulze

      Disaster Recovery Advocate, Acronis

    2. Photo of James R. Slaby

      James R. Slaby

      Director, Cyber Protection, Acronis

  11. Zero Days and Patch Lag: Stemming the Software Pandemic

    Chrome has become the increasing subject of Zero Day Exploits owing to the unavoidable problem of patch lag

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  12. The Story of the EC-Council Gender Survey Scandal: Survey Creator Says "It Was Written by Women so it Can't be Sexist"

    On Friday 09 April, EC-Council pushed out a ‘women in security’ survey poll on LinkedIn with three abhorrently sexist answer options. Eleanor Dallaway investigates…

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  13. How Security Culture Invokes Secure Behavior

    Orgs should take steps to improve their security culture now

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  14. How SASE is Key to 5G Security Success

    With the SASE model, orgs will have the opportunity to offer more secure 5G networks

    1. Photo of Amit Bareket

      Amit Bareket

      CEO and Co-Founder, Perimeter 81

  15. Questions Enterprises Should Be Asking as they Migrate to the Cloud

    What steps should orgs take to ensure a secure move to the cloud?

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  16. Risk Management Program Development 101

    What are the steps orgs need to take to develop a successful risk management program?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  17. Blurring Boundaries: Keeping ‘Consumer’ Scams Out of the Business Environment

    Every business should act now to safeguard themselves and mitigate the impact of an attack

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  18. Who Should Own Third Party Risk Management?

    TPRM’s role in keeping orgs safe from cyber-attacks creates differing opinions on where it should reside

    1. Photo of Tony Howlett

      Tony Howlett

      CISO, SecureLink

  19. #COVID19, Password Spraying and the NHS

    How password spraying risks threatens the NHS

    1. Photo of Sophie Porter

      Sophie Porter

      Health Tech Writer

  20. Why Employee Cyber-Awareness is Critical Every Day, Not Just During a Crisis

    Organizations need to ensure their awareness programs are relevant and targeted

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

What’s hot on Infosecurity Magazine?