Infosecurity Blogs

  1. The Benefits of Unified Physical Security Systems

    Unified security systems can greatly enhance business operations

    1. Photo of Anthonie van der Ploeg

      Anthonie van der Ploeg

      Sales Director Benelux & Nordics, Genetec

  2. The Risk of Collaboration Apps

    How have cyber-criminals exploited the rise in collaboration apps, and what can orgs do about it?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  3. How Hackers Use Cloud Services to Make Cybercrime More Profitable

    Cloud services can optimize resources, save time, increase automation, and take some of the security responsibility off of an organization’s plate.

    1. Photo of Bob McArdle

      Bob McArdle

      Director FTR - Cybercrime Research, Trend Micro

  4. The Five Strategies Users Use to Determine Phishing: Which Work and Which Don’t?

    Verizon estimates that 90% of all data breaches originate from phishing and according to the Anti Phishing Working Group, the number of phishing websites are at an all-time high right now.

    1. Photo of Robert  Lagerström

      Robert Lagerström

      Associate Professor, KTH Royal Institute of Technology & Founder, Foreseeti

  5. A Story of Human Error and Revenge

    Organizations must understand how employee stress can lead to cybersecurity errors

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  6. Too Much Trust?

    Have security pros been too relaxed about cyber-threats during the pandemic?

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  7. Addressing Burn Out in Cybersecurity Teams

    With cyber-threats increasing rapidly, what steps can be taken to help avoid burn out in security teams?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  8. Ransomware: To Pay or Not to Pay?

    Ransomware is an increasingly prevalent threat to small and medium-size business, but when is it right to pay a ransom?

    1. Photo of Kris Schulze

      Kris Schulze

      Disaster Recovery Advocate, Acronis

    2. Photo of James R. Slaby

      James R. Slaby

      Director, Cyber Protection, Acronis

  9. Zero Days and Patch Lag: Stemming the Software Pandemic

    Chrome has become the increasing subject of Zero Day Exploits owing to the unavoidable problem of patch lag

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  10. The Story of the EC-Council Gender Survey Scandal: Survey Creator Says "It Was Written by Women so it Can't be Sexist"

    On Friday 09 April, EC-Council pushed out a ‘women in security’ survey poll on LinkedIn with three abhorrently sexist answer options. Eleanor Dallaway investigates…

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  11. How Security Culture Invokes Secure Behavior

    Orgs should take steps to improve their security culture now

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  12. How SASE is Key to 5G Security Success

    With the SASE model, orgs will have the opportunity to offer more secure 5G networks

    1. Photo of Amit Bareket

      Amit Bareket

      CEO and Co-Founder, Perimeter 81

  13. Questions Enterprises Should Be Asking as they Migrate to the Cloud

    What steps should orgs take to ensure a secure move to the cloud?

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  14. Risk Management Program Development 101

    What are the steps orgs need to take to develop a successful risk management program?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  15. Blurring Boundaries: Keeping ‘Consumer’ Scams Out of the Business Environment

    Every business should act now to safeguard themselves and mitigate the impact of an attack

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  16. Who Should Own Third Party Risk Management?

    TPRM’s role in keeping orgs safe from cyber-attacks creates differing opinions on where it should reside

    1. Photo of Tony Howlett

      Tony Howlett

      CISO, SecureLink

  17. #COVID19, Password Spraying and the NHS

    How password spraying risks threatens the NHS

    1. Photo of Sophie Porter

      Sophie Porter

      Health Tech Writer

  18. Why Employee Cyber-Awareness is Critical Every Day, Not Just During a Crisis

    Organizations need to ensure their awareness programs are relevant and targeted

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  19. Why Quantum Computers Pose a Very Real Risk to Cybersecurity

    The quantum threat, why it matters and why addressing it cannot wait

    1. Photo of Dr Ali  El Kaafarani

      Dr Ali El Kaafarani

      Founder and CEO, PQShield

  20. Cybersecurity Survivorship Bias and How to Avoid it

    Why orgs should avoid falling into survivorship bias

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

What’s Hot on Infosecurity Magazine?