Infosecurity Blogs

Was the Equifax CSO to Blame?

Was the Equifax CSO to Blame?

Companies should want well-rounded individuals that can manage people, understand the risks for the company, can communicate with the board, and understand legal ramifications.

Interview: What is the Future of IT Security?

Interview: What is the Future of IT Security?

Malgorzata Zabieglinska-Lupa discusses the most important questions regarding the challenges and latest trends influencing the security industry with Comarch’s Ewelina Kornas-Zarzycka

Brought to you by
Comarch

#ISC2Congress: Another Women in Cybersecurity Panel…

#ISC2Congress: Another Women in Cybersecurity Panel…

Women in cybersecurity panels aren’t all that rare these days. In fact, I almost skipped the one on the agenda at (ISC)2 Congress in Austin this week because I feel like I’ve been to so many that perhaps I need to take a break.

Securing Modern Assets in the Digital Transformation Age

Securing Modern Assets in the Digital Transformation Age

One of the biggest challenges of today’s evolving IT landscape is visibility into modern assets.

How Humans (and Machines) Can Help Fight Phishing

How Humans (and Machines) Can Help Fight Phishing

If we are the weakest link in the cybersecurity infrastructure, shouldn’t we get rid of the human aspect altogether?

Can MSSPs Help Address the Cyber Workforce Shortage for Healthcare?

Can MSSPs Help Address the Cyber Workforce Shortage for Healthcare?

Healthcare organizations that are challenged with finding, onboarding and keeping cyber professionals might want to consider an MSSP

Important Information on New EU Regulations

Important Information on New EU Regulations

Failure to comply with new guidelines will result in significant financial penalties

Brought to you by
Comarch

Why The Equifax Hack Doesn't Matter!

Why The Equifax Hack Doesn't Matter!

The Equifax breach doesn’t matter as your data was already out there!

In-House or Cloud? Where is More Secure?

In-House or Cloud? Where is More Secure?

There is a ‘most appropriate’ model that depends on the unique requirements of your business, the size of your company and your budget

Brought to you by
Comarch

Back to School 101: Cyber Hygiene For Students

Back to School 101: Cyber Hygiene For Students

Does your family's back-to-school checklist include a cyber hygiene check-up? If not, here are a few quick tips.

Defray Attacks Highlight Trends in Ransomware Campaigns

Defray Attacks Highlight Trends in Ransomware Campaigns

Defray is a customized ransomware program that encrypts all files contained on a victim’s hard drive upon download and execution.

Security: Trends of Threats in 2017

Security: Trends of Threats in 2017

Websites dealing with security issues are more and more frequently reporting new threats in the IT field

Brought to you by
Comarch

Our Bloggers

What’s Hot on Infosecurity Magazine?