Infosecurity Blogs

State of Cybersecurity 2018: Enterprises Can Do Better

State of Cybersecurity 2018: Enterprises Can Do Better

Are things in cybersecurity better or worse than they were 12 months ago?

Dispelling the FUD: Key insights from the "#GDPR for Dummies" Roadshow

Dispelling the FUD: Key insights from the "#GDPR for Dummies" Roadshow

Metacompliance offers advice collected from common questions on its GDPR for Dummies" Roadshow.

Data Breach Notifications and Why Honesty is the Best Policy

Data Breach Notifications and Why Honesty is the Best Policy

In the case of a data breach, it's in a business’s best interest to be as honest with customers as possible.

Securing Your Organization's Human Layer

Securing Your Organization's Human Layer

There is value in adopting a cybersecurity framework because of the structured manner of thinking that it helps impose.

Securing Critical Infrastructure in the Wake of Unprecedented Cyber Threats

Securing Critical Infrastructure in the Wake of Unprecedented Cyber Threats

New legislation is due this month to help make nations more resilient in the face of disruptive malware.

How to Cure the Healthcare System's 'Cyberflu'

How to Cure the Healthcare System's 'Cyberflu'

How vulnerable is the healthcare industry to cyber-attack, and who needs to take the lead to improve its posture?

What Changes Q1 Brought to Cybersecurity

What Changes Q1 Brought to Cybersecurity

Mari Galloway from the Women's Society of Cyberjutsu looked at what major headlines changed cybersecurity in Q1.

Treat Security Data With the Same Purpose as Financial Data

Treat Security Data With the Same Purpose as Financial Data

There’s a comparable amount of security data as there is financial data flowing through a financial organization.

Why Healthcare Cannot Afford to Rely on Two-Factor Authentication

Why Healthcare Cannot Afford to Rely on Two-Factor Authentication

On its own, 2FA will protect you some of the time but not all the time.

The Cost of Sharing Our Data Online

The Cost of Sharing Our Data Online

A personality app harvested your data and Facebook and Cambridge Analytica faced government scrutiny, but we knew this was coming.

Compliance and Your Data Center

Compliance and Your Data Center

Compliance standards aren't only in place to make your life difficult, they exist for the good of your business.

Understand the Inherent Risk in Browser Extensions

Understand the Inherent Risk in Browser Extensions

A look at vulnerabilities in browser application stores that contain well-intentioned, yet vulnerable, extensions, as well as purposefully developed malware.

Our Bloggers

What’s Hot on Infosecurity Magazine?