Infosecurity Blogs

Integrating XDR into your SOC
Discover the top myths around XDR, EDR and MDR and look into how to integrate XDR effectively into your SOC, without breaking the bank

Reduce risk and innovate anywhere with a Cloud without Compromise
Why the vision of the future cannot be based on the paradigm of the past

Debunking Hard Drive Destruction Misconceptions
The correct path is following NSA standards and degaussing all magnetic media

Fixing a Common Active Directory Weakness: Poor Authentication Security
This article dives into one common AD weakness – poor authentication security – and how to address it to improve the organization’s overall security posture

Think Your End-of-Life Data is Destroyed? Think Again!
It is a scary but familiar misbelief that simply erasing drives clean is enough to keep your information safe

ISOMorph and HTML Smuggling
How should organizations combat the re-emergence of HTML smuggling?

Elevated Cyber-risk as Companies Choose Speed Over Security
To lower cyber-risk, organizations must be better prepared by going back to basics

Is Complacency the Biggest Cyber Threat?
What does ISACA's recent State of Cybersecurity report tell us about the best ways to tackle rising cyber-attacks?

Top 5 Secrets for Mitigating Cyber-attacks in Microsoft 365 Environments
Five renowned experts share best practices for preventing and mitigating cyber-attacks in Microsoft 365 environments

Cybersecurity, Community and Change: How to Meet the Coming Challenge
As we enter the fourth industrial revolution, we require a community effort to reskill and upskill people into digital security careers

How to Tackle Open Source Vulnerabilities While Closing the DevOps/SecOps Gap
Creating more efficiency in the workplace often involves tearing down silos and increasing cross-functional collaboration to deliver better outcomes

How to Repair Corrupt Exchange Database using the EseUtil Tool
In this article, we explain the six steps to repair a corrupt Exchange database

Ransomware – Three Questions to Ask Your Cybersecurity Teams
When it comes to cybersecurity threats, there are three essential questions to ask to determine how prepared you are for a ransomware attack.

Tales From the SOC: Dealing with the Dangers of Freeware
AT&T's SOC team highlight the dangers of downloading freeware

Embrace your Business Reality with a Strong Hybrid Cloud Strategy
Whether fully cloud native, in the middle of a migration process or beginning the move, several benefits come from implementing a solid hybrid cloud approach

Top 5 Data Breaches in History
The biggest, strangest and most embarrassing data breaches in history

Ransomware: Why it is on the Rise, and How Can Companies Respond?
A zero trust approach and isolation technology are key to preventing ransomware infections

Top Five Hacking Portrayals in Movies and TV
What have been the best portrayals of hacking in TV and films over the years?

How Much Do Hackers Pay for Stolen Personal Data on the Dark Web?
Privacy Affairs investigated how the dark web market has changed and adapted since 2020. Here are some of their findings:

5 Ways to Stop Ransomware in its Tracks
There are several key measures organizations can take to stop ransomware attacks in their tracks


















