Infosecurity Blogs

Ransomware – Three Questions to Ask Your Cybersecurity Teams
When it comes to cybersecurity threats, there are three essential questions to ask to determine how prepared you are for a ransomware attack.

Tales From the SOC: Dealing with the Dangers of Freeware
AT&T's SOC team highlight the dangers of downloading freeware

Embrace your Business Reality with a Strong Hybrid Cloud Strategy
Whether fully cloud native, in the middle of a migration process or beginning the move, several benefits come from implementing a solid hybrid cloud approach

Top 5 Data Breaches in History
The biggest, strangest and most embarrassing data breaches in history

Ransomware: Why it is on the Rise, and How Can Companies Respond?
A zero trust approach and isolation technology are key to preventing ransomware infections

Top Five Hacking Portrayals in Movies and TV
What have been the best portrayals of hacking in TV and films over the years?

How Much Do Hackers Pay for Stolen Personal Data on the Dark Web?
Privacy Affairs investigated how the dark web market has changed and adapted since 2020. Here are some of their findings:

5 Ways to Stop Ransomware in its Tracks
There are several key measures organizations can take to stop ransomware attacks in their tracks

Why Cloud Architectures and Configurations are Like Eating Pizza and Building Lego
Migrating to the cloud can be full of promise, but organizations should understand what’s required in their slice of the cloud pie

Top 5 Mobile Device Security Tips
What five steps should organizations take to secure their employees’ mobile devices?

Zero Trust for Insider Access
Insider access has emerged as a new threat. Implementing components of zero trust architecture can prevent internal attacks and protect networks and systems

Best Practices for Securing Your APIs
API breaches are on the rise and are having a dramatic impact on businesses. Organizations should follow four best practice steps to protect APIs

The Next Equifax Attack...That Never Happened
Although a cyber-attack similar to the infamous Equifax breach was thwarted, it shows the urgent need to address digital supply chain security

Tailored Administration: A Catalyst for Zero Trust Architecture
Zero trust architectures are important, but implementation issues persist. Fortunately, a tailored, custom administration can make it achievable

The Rise of Initial Access Brokers
How can orgs protect themselves against initial access brokers?

Driving Efficiency with Integrated Management Systems: An OCTO Telematics Case Study
OCTO Telematics CISO, Attilio De Bernardo, explains how his organization uses an integrated management system and certification to improve its security posture

Linux-based Malware Requires Linux Focused Cybersecurity Strategy
Trend Micro's Erin Sindelar considers the Linux-focused cybersecrity strategy needed to tackle an increase in Linux-based malware

Creating a Secure Solution Development Lifecycle for Healthcare
What is SSDLC and can this enhance the security of healthcare organizations?

The Rise of Device Encryption
Company-wide encryption of data is being increasingly recognized as a straightforward way of mitigating the risk of data breach

Parting Shots From Former Editor, Michael Hill
Former Infosecurity Editor, Michael Hill, reflects on his time at Infosecurity Magazine




















