Infosecurity Blogs

  1. Here’s What Universities Need to Know About Cyber-Attacks

    A recent spate of ransomware attacks, suggests that cyber-criminals are taking advantage of the weaknesses of the new hybrid learning model at Universities. Here are three lessons universities need to quickly learn to avoid falling victim to devastating cyber-attacks

    1. Photo of Jonathan Lee

      Jonathan Lee

      Director of Public Sector, Sophos

  2. A Prequel to Ransomware

    How should orgs react to ransomware incidents?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  3. Misconfigurations are the Biggest Threat to Cloud Security: Here's What to Do

    Four ways to protect against cloud security misconfigurations, the biggest threat to cloud security

    1. Photo of Greg Young

      Greg Young

      Vice President for Cybersecurity, Trend Micro

  4. Why are Companies Still Struggling to Support Safe Remote Working?

    Remote workers continue to pose a major threat to data security, more than a year after the office exodus that caught many companies off guard. Jon Fielding investigates

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  5. The Digital Training Revolution and Mass Mandatory ‘Modulation’

    The effectiveness of digital training is greatly improved with appropriate supervision and leadership

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  6. Top 5 Attacks in Commonly Used SaaS Apps

    One of the most prevalent places for a company leak or breach has to do with misconfigurations found in an organization's SaaS apps. Here are five examples from real-world attacks.

    1. Photo of Maor  Bin

      Maor Bin

      CEO & Co-Founder, Adaptive Shield

  7. The Expanding Scope and Complexity of Credentials Phishing

    How should orgs combat the rise in credential phishing attacks?

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  8. Security in the Cloud: Where Your Responsibility Begins and the Cloud Provider's Ends

    Cloud computing has revolutionized the IT world, so resources in the cloud must be safer, right? Wrong.

    1. Security Researcher

      Trend Micro

  9. Overcoming The Challenges of Emerging Technology

    How can security pros stay informed about emerging technologies?

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  10. The Dystopic Future of Cybersecurity and the Importance of Empowering CISOs

    Vanessa Pegueros explores the importance of empowering CISOs facing the ever-traumatizing threats of cybercrime

    1. Photo of Vanessa  Pegueros

      Vanessa Pegueros

      Chief Trust & Security Officer, OneLogin

  11. CISO Stories: Part Two

    This is the story of Boris, CISO at an international charity

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  12. Misconfigurations are Mistakes: Eliminate the Biggest Vulnerability in Cloud Services

    Mark Nunnikhoven argues that organizations should be pushing to move faster to the cloud in order to improve their security

    1. Security Researcher

      Trend Micro

  13. Time for Infosec Professionals’ Imaginations to Stretch to Outer Space

    Cybersecurity must be at the heart of the development of the space sector

    1. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

  14. Six Ways to Improve Your Cyber-Resilience to Combat Cyber-Attacks

    Six tips for improving your company's cyber-resilience to combat cyber-attacks in 2021

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  15. The Benefits of Unified Physical Security Systems

    Unified security systems can greatly enhance business operations

    1. Photo of Anthonie van der Ploeg

      Anthonie van der Ploeg

      Sales Director Benelux & Nordics, Genetec

  16. The Risk of Collaboration Apps

    How have cyber-criminals exploited the rise in collaboration apps, and what can orgs do about it?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  17. How Hackers Use Cloud Services to Make Cybercrime More Profitable

    Cloud services can optimize resources, save time, increase automation, and take some of the security responsibility off of an organization’s plate.

    1. Photo of Bob McArdle

      Bob McArdle

      Director FTR - Cybercrime Research, Trend Micro

  18. The Five Strategies Users Use to Determine Phishing: Which Work and Which Don’t?

    Verizon estimates that 90% of all data breaches originate from phishing and according to the Anti Phishing Working Group, the number of phishing websites are at an all-time high right now.

    1. Photo of Robert  Lagerström

      Robert Lagerström

      Associate Professor, KTH Royal Institute of Technology & Founder, Foreseeti

  19. A Story of Human Error and Revenge

    Organizations must understand how employee stress can lead to cybersecurity errors

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  20. Too Much Trust?

    Have security pros been too relaxed about cyber-threats during the pandemic?

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

What’s Hot on Infosecurity Magazine?