Infosecurity Blogs

Why Cloud Architectures and Configurations are Like Eating Pizza and Building Lego
Migrating to the cloud can be full of promise, but organizations should understand what’s required in their slice of the cloud pie

Top 5 Mobile Device Security Tips
What five steps should organizations take to secure their employees’ mobile devices?

Zero Trust for Insider Access
Insider access has emerged as a new threat. Implementing components of zero trust architecture can prevent internal attacks and protect networks and systems

Best Practices for Securing Your APIs
API breaches are on the rise and are having a dramatic impact on businesses. Organizations should follow four best practice steps to protect APIs

The Next Equifax Attack...That Never Happened
Although a cyber-attack similar to the infamous Equifax breach was thwarted, it shows the urgent need to address digital supply chain security

Tailored Administration: A Catalyst for Zero Trust Architecture
Zero trust architectures are important, but implementation issues persist. Fortunately, a tailored, custom administration can make it achievable

The Rise of Initial Access Brokers
How can orgs protect themselves against initial access brokers?

Driving Efficiency with Integrated Management Systems: An OCTO Telematics Case Study
OCTO Telematics CISO, Attilio De Bernardo, explains how his organization uses an integrated management system and certification to improve its security posture

Linux-based Malware Requires Linux Focused Cybersecurity Strategy
Trend Micro's Erin Sindelar considers the Linux-focused cybersecrity strategy needed to tackle an increase in Linux-based malware

Creating a Secure Solution Development Lifecycle for Healthcare
What is SSDLC and can this enhance the security of healthcare organizations?

The Rise of Device Encryption
Company-wide encryption of data is being increasingly recognized as a straightforward way of mitigating the risk of data breach

Parting Shots From Former Editor, Michael Hill
Former Infosecurity Editor, Michael Hill, reflects on his time at Infosecurity Magazine

6 Important Questions About Anomaly Detection
Anomaly detection is vital in identifying activity that does not conform to an expected pattern. But what is it?

Smishing: Analyzing Sophisticated Scam Methods
The rise of more sophisticated smishing methods has exacerbated the growing threat environment

Hello From Your New Deputy Editor
Our new deputy editor introduces himself and explains why he joined Infosecurity Magazine

Proactive Approach to Soft Skills Gap Needed in Security Industry
There are huge opportunities in the security industry for those who develop their soft skills

Defining Cybersecurity in a Hybrid World
As many employees return to the office, what security issues do organizations need to focus on?

Securing Containers: Seven Key Concerns and What to Do About Them
When building out a security strategy for containers, there are generally seven primary concerns. This article explains what they are, and what to do

Here’s What Universities Need to Know About Cyber-Attacks
A recent spate of ransomware attacks, suggests that cyber-criminals are taking advantage of the weaknesses of the new hybrid learning model at Universities. Here are three lessons universities need to quickly learn to avoid falling victim to devastating cyber-attacks

A Prequel to Ransomware
How should orgs react to ransomware incidents?






















