Infosecurity Blogs

The Link Between the Champions League and Cyber-Attacks

The Link Between the Champions League and Cyber-Attacks

Users have been setting both personal and memorable terms such as football club names for their passwords

Brought to you by
Specops

Offline Backups Versus Cloud Backups - Which One Should You Choose?

Offline Backups Versus Cloud Backups - Which One Should You Choose?

The smartest move is a multi-layered, multi-location approach that covers maximum eventualities — both online and offline

Brought to you by
Apricorn

SOC Analyst of the Future: The Impact of Accelerating Transformation

SOC Analyst of the Future: The Impact of Accelerating Transformation

Regardless of whether or not you outsource your security operations, developing your SOC from a people, process and technology perspective is paramount

Records Retention Schedules: When Will Your Data Expire?

Records Retention Schedules: When Will Your Data Expire?

Why establishing an RRP is crucial in ensuring corporate documents are managed and destroyed in a lawful, effective and efficient way

Brought to you by
SEM

Defusing an In-Progress Active Directory Attack

Defusing an In-Progress Active Directory Attack

This article sets out how security pros were able to defuse an in-progress attack that targeted the Active Directory (AD) environment

Brought to you by
Semperis

The Shocking DDoS Attack Statistics That Prove You Need Protection

The Shocking DDoS Attack Statistics That Prove You Need Protection

This article displays alarming DDoS attack statistics that highlight the pressing need for an effective DDoS Protection solution for businesses

Brought to you by
Indusface

SQL Server Disaster Recovery: Key Considerations

SQL Server Disaster Recovery: Key Considerations

Define the success metrics, choose the right backup strategy and leverage SQL server availability features

Brought to you by
Stellar

Assess and Secure Your Linux Footprint – Now!

Assess and Secure Your Linux Footprint – Now!

Who is responsible for the security of all the Linux instances running your cloud environment?

Brought to you by
Trend Micro

Modern Cyber-Criminals Don't Hack in - They Log in

Modern Cyber-Criminals Don't Hack in - They Log in

With so many common threats requiring human interaction, modern cyber-criminals no longer needs to hack into an organization

DDoS Attacks 25th Anniversary: A Wake-Up Call

DDoS Attacks 25th Anniversary: A Wake-Up Call

September 2021 is a milestone in the cybersecurity world. It marks the 25th anniversary of the first DDoS attack.

Brought to you by
Citrix

The Growing Size of Media: Just How Much Information Can Be Stored on 1TB?

The Growing Size of Media: Just How Much Information Can Be Stored on 1TB?

Having a secure end-of-life destruction plan is crucial in protecting that amount of data

Brought to you by
SEM

State of SecOps 2021: 5 Trends That Should Shape Your Security Approach

State of SecOps 2021: 5 Trends That Should Shape Your Security Approach

Businesses must adopt a threat modeling framework, implement processes for managing the attack surface and aggressively push automation

Brought to you by
Micro Focus

Our Bloggers

What’s Hot on Infosecurity Magazine?