Infosecurity Blogs

  1. Cybersecurity, Community and Change: How to Meet the Coming Challenge

    As we enter the fourth industrial revolution, we require a community effort to reskill and upskill people into digital security careers

    1. Photo of Melissa Elza

      Melissa Elza

      vCPO, principal partner, HoneyBee HR

    2. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

  2. How to Tackle Open Source Vulnerabilities While Closing the DevOps/SecOps Gap

    Creating more efficiency in the workplace often involves tearing down silos and increasing cross-functional collaboration to deliver better outcomes

    1. Photo of Aaron Ansari

      Aaron Ansari

      VP, Cloud Security, Trend Micro

  3. How to Repair Corrupt Exchange Database using the EseUtil Tool

    In this article, we explain the six steps to repair a corrupt Exchange database

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  4. Ransomware – Three Questions to Ask Your Cybersecurity Teams

    When it comes to cybersecurity threats, there are three essential questions to ask to determine how prepared you are for a ransomware attack.

    1. Photo of Kimberley Coffin

      Kimberley Coffin

      Global Technical Director, Lloyds Register

  5. Tales From the SOC: Dealing with the Dangers of Freeware

    AT&T's SOC team highlight the dangers of downloading freeware

    1. SOC Team

      AT&T Cybersecurity

  6. Embrace your Business Reality with a Strong Hybrid Cloud Strategy

    Whether fully cloud native, in the middle of a migration process or beginning the move, several benefits come from implementing a solid hybrid cloud approach

    1. Photo of Greg Young

      Greg Young

      Vice President for Cybersecurity, Trend Micro

  7. Top 5 Data Breaches in History

    The biggest, strangest and most embarrassing data breaches in history

    1. Photo of Sarah Coble

      Sarah Coble

      News Writer

  8. Ransomware: Why it is on the Rise, and How Can Companies Respond?

    A zero trust approach and isolation technology are key to preventing ransomware infections

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  9. Top Five Hacking Portrayals in Movies and TV

    What have been the best portrayals of hacking in TV and films over the years?

    1. Photo of Sarah Coble

      Sarah Coble

      News Writer

  10. How Much Do Hackers Pay for Stolen Personal Data on the Dark Web?

    Privacy Affairs investigated how the dark web market has changed and adapted since 2020. Here are some of their findings:

  11. 5 Ways to Stop Ransomware in its Tracks

    There are several key measures organizations can take to stop ransomware attacks in their tracks

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  12. Why Cloud Architectures and Configurations are Like Eating Pizza and Building Lego

    Migrating to the cloud can be full of promise, but organizations should understand what’s required in their slice of the cloud pie

    1. Photo of Raphael Bottino

      Raphael Bottino

      Solutions Architect, Trend Micro

  13. Top 5 Mobile Device Security Tips

    What five steps should organizations take to secure their employees’ mobile devices?

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  14. Zero Trust for Insider Access

    Insider access has emerged as a new threat. Implementing components of zero trust architecture can prevent internal attacks and protect networks and systems

    1. Photo of Daniel Fabbri

      Daniel Fabbri

      Chief Data Scientist, Secure Link

  15. Best Practices for Securing Your APIs

    API breaches are on the rise and are having a dramatic impact on businesses. Organizations should follow four best practice steps to protect APIs

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  16. The Next Equifax Attack...That Never Happened

    Although a cyber-attack similar to the infamous Equifax breach was thwarted, it shows the urgent need to address digital supply chain security

    1. Photo of Nethanel Gelernter

      Nethanel Gelernter

      Founder and CEO, Cyberpion

  17. Tailored Administration: A Catalyst for Zero Trust Architecture

    Zero trust architectures are important, but implementation issues persist. Fortunately, a tailored, custom administration can make it achievable

    1. Photo of Kayla Gesek

      Kayla Gesek

      Product manager, OneLogin

  18. The Rise of Initial Access Brokers

    How can orgs protect themselves against initial access brokers?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  19. Driving Efficiency with Integrated Management Systems: An OCTO Telematics Case Study

    OCTO Telematics CISO, Attilio De Bernardo, explains how his organization uses an integrated management system and certification to improve its security posture

    1. Photo of Katerina Liana

      Katerina Liana

      Lead Certification Specialist, Lloyd's Register

  20. Linux-based Malware Requires Linux Focused Cybersecurity Strategy

    Trend Micro's Erin Sindelar considers the Linux-focused cybersecrity strategy needed to tackle an increase in Linux-based malware

    1. Photo of Erin Sindelar

      Erin Sindelar

      Threat Researcher & Communicator, Trend Micro

What’s Hot on Infosecurity Magazine?