Infosecurity Blogs

  1. Your New Tools and Policies Won’t Save You

    As technology advances, we should not lose sight of the importance of the human component of cybersecurity

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  2. Five Key Cybersecurity Themes from 2020

    What were the biggest cybersecurity trends seen in 2020?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  3. Taking the First Steps Toward Self-Repairing Endpoints

    How close are we to self-repairing endpoints?

    1. Photo of Candid  Wüest

      Candid Wüest

      VP of Cyber Protection Research, Acronis

  4. Corporate Endpoint Security: How to Protect Yourself from Fileless Threats and Detect Insiders

    Even with an endpoint solution, there is likely to be gaps that can and should be closed

    1. Photo of Oleg  Zaitsev

      Oleg Zaitsev

      Security Expert, Anti-Malware Technologies Development, Kaspersky

  5. Addressing the Manufacturing Threat Landscape

    Connected manufacturing has introduced sophisticated threats to data, IP and operations

  6. Today’s Mobile Workforce: Don’t Compromise on Cybersecurity

    In today’s uncertain working world, it is vital your teams can work anywhere

    1. Photo of Andrey  Dankevich

      Andrey Dankevich

      Senior Product Marketing Manager, Kaspersky

  7. Top Three Cyber-Threats to Look Out for in 2021

    Three predictions of IT risks that organizations will face in 2021

    1. Photo of Candid  Wüest

      Candid Wüest

      VP of Cyber Protection Research, Acronis

  8. How to Manage Shadow IT for the Benefit of Business and Employees

    The mix of corporate and non-corporate web services at work is no longer a question – it is a reality

    1. Photo of Alexander Moiseev

      Alexander Moiseev

      Chief Business Officer, Kaspersky

  9. Mitigating Healthcare Ransomware Attacks

    Ransomware attacks have seen a sharp rise this year and hospitals have been particularly vulnerable

    1. Photo of Ben Webster

      Ben Webster

      Password Security Expert, Specops Software

  10. Transitioning into Cyber Space

    The transition from work to home working has created a plethora of challenges,

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  11. How it Works: Machine Learning Against Email Phishing

    Phishing remains one of the most fraudulent tricks that can be found in malicious email traffic

    1. Photo of Nikita  Benkovich

      Nikita Benkovich

      Senior Data Scientist, Anti-Spam Technologies Development, Kaspersky

  12. Achieving Complete Control Across Your SaaS Applications: Is it Possible?

    Today, organizations rely on SaaS platforms for just about everything

    1. Photo of Maor  Bin

      Maor Bin

      CEO & Co-Founder, Adaptive Shield

  13. For Most Companies, Securing Remote Work is Unfinished Business

    To secure their companies’ ability to work remotely, many IT teams are expediting their move to the cloud and SaaS applications

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  14. How Incident Response Teams Survived COVID-19

    An overview of the incident response trends seen during this year's pandemic

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  15. Email Attacks on the Retail Industry: ‘Tis the Season

    UK retailers are not fully prepared and are not adequately protecting customers

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  16. Can Cyber Hygiene Lead to a Cyber Secure Attitude?

    If more people are cyber hygienic than not, then a positive cybersecurity culture emerges

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  17. The Value of a Compromised Cloud Account

    A compromised Office 365 account is a coveted target for malicious actors

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  18. Solving the Global Cybersecurity Skills Gap in Two Simple Steps

    How to address the global cybersecurity skills shortage

    1. Photo of Andrej Kovacevic

      Andrej Kovacevic

      Marketing Manager, Amebae Online

  19. Five Emerging Cyber-Threats to Watch Out for in 2021

    The five trends that will dominate the cybersecurity landscape in 2021

    1. Photo of Candid  Wüest

      Candid Wüest

      VP of Cyber Protection Research, Acronis

  20. Are Rogue Insiders an Excuse, Symptom or Root Cause?

    We need to look at the security controls that should identify and defeat rogue insiders

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

What’s Hot on Infosecurity Magazine?