Infosecurity Blogs

  1. How Cyber-Criminals 'Get in the Game' and What it Means to Defend Against Them

    How do cyber-criminals become criminals?

    1. Photo of Kacey Clark

      Kacey Clark

      Security Researcher, Digital Shadows

  2. Disinformation and the CISO

    Fighting disinformation may be one of the biggest challenges that CISOs will face in the coming months and years #AADisinformation

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  3. How to Secure IT Efficiencies and Cost Savings in a Post-COVID World

    Common issues at the service desk and security gaps that can be resolved quickly

    1. Photo of Darren  James

      Darren James

      Senior Product Manager, Specops Software – An Outpost24 Company

  4. Supply Chain Cybersecurity: What You Need to Consider

    While supply chain cybersecurity can seem overwhelming, there are effective steps you can take

    1. Photo of Tommy  McDowell

      Tommy McDowell

      General Manager, Celerium

  5. Major Lessons to be Learned from 2020 Security Mishaps

    Attacks have caused damage and presented several key lessons moving forward

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  6. Securing IT During the Pandemic: Report Reveals Cyber-Readiness Challenges

    Organizations must focus on strategies and solutions that are highly adaptable, integrated and proactively protective

  7. How COVID-19 Forced Forex Software Providers to Improve Security

    Financial authorities have been warning forex traders about the heightened threat of security breaches

    1. Photo of Justin Grossbard

      Justin Grossbard

      Managing Director, Compare Forex Brokers

  8. ISO 27001: Recognizing the Importance of Operational Security

    Good operational security is crucial, but it’s not always appreciated and is often challenging to execute consistently

  9. Defending U.S. Voting Processes Now and into the Future

    2020 has created the perfect storm of challenges for the democratic process this year.

    1. Photo of Casey Ellis

      Casey Ellis

      Founder and CTO, Bugcrowd

  10. The Changing Cyber-Landscape and How Organizations Can Reduce the Risks

    IT teams need to adapt and become more agile to keep nefarious actors at bay

    1. Photo of Josh  Horwitz

      Josh Horwitz

      Chief Operating Officer, Enzoic

  11. Why 10,000 Years of Disinformation Will Not Suddenly Go Away

    Today misinformation can be spread in the blink of an eye (or the tap of a keystroke

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  12. COVID-19 and Cybersecurity Staffing Shortages

    Why staffing shortages are getting worse and how to address the issue

    1. Photo of Emma  Brighton

      Emma Brighton

      Content Strategist

  13. Time to Pardon Edward Snowden?

    Edward Snowden, in the end, did the right thing by notifying the public of illegal privacy violations, and it’s time he came home

    1. Photo of Dan Arel

      Dan Arel

      Startpage Consultant

  14. Three Reasons Why Password Self-Service Enrollment Fails, and What to Do About it!

    Password self-service enrollment needs to be a process that is intuitive, simple and non-invasive

    1. Photo of Nick Cavalancia

      Nick Cavalancia

      Microsoft Cloud and Datacenter MVP

  15. Repairing SQL Database Corruption with CHECKDB Repair? You Can Lose Your Data Forever

    An enterprise database repair tool can plug gaps in your SQL database maintenance and restoration strategy

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  16. Credential Stuffing: the Culprit of Recent Attacks

    Credential stuffing attacks use stolen usernames and password combinations

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  17. IR Planning – It Is Not Optional!

    Understanding what to do when an incident occurs and who to talk to is critical to ensuring there is an effective response

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  18. Double Extortion Ransomware Attacks and the Role of Vulnerable Internet-Facing Systems

    Ransomware attacks are adopting an approach defined as “double extortion"

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  19. Cyberwarfare: the New Frontier of Wars Between Countries

    Cyberwarfare can be launched instantly, making it difficult to counter

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  20. A New Path for Data Protection

    Any organization that is dealing with large amounts of unstructured data should strongly consider microsharding

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

What’s Hot on Infosecurity Magazine?