Infosecurity Blogs

  1. Dangerous Liaisons - Cloudphishing

    The growing adoption (and exploitation) of cloud services requires a cloud-native security approach

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  2. Data Security and Third-Party IT Asset Disposition: A Paradox

    The only truly secure method of IT asset disposition is in-house drive destruction

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  3. Patching OpenSSL and GNU C Libraries Without Service Restarts

    Organizations in all industries must ensure they are promptly mitigating vulnerabilities to prevent exploitation

    1. Photo of Aleksandra Mitroshkina

      Aleksandra Mitroshkina

      Product Marketing Manager, KernelCare

  4. Building Cyber-Maturity Through Understanding Supply Chain Risks

    A holistic approach, with proper management mechanisms in place, can increase cyber-maturity and reduce organizational risk

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  5. NIST Password Guidelines: What You Need to Know

    Organizations’ best line of defense hinges on the ability to ensure security at the password layer

    1. Photo of Josh  Horwitz

      Josh Horwitz

      Chief Operating Officer, Enzoic

  6. Using Trademarks to Combat COVID-19 Related Phishing

    Straightforward domain name procedures can provide efficient relief against fraudulent websites and email.

    1. Photo of Evan Brown

      Evan Brown

      Principal at Much Shelist

  7. Managing the Cybersecurity Threat Landscape with a Standard Approach

    Certification against ISO 27001 shows that an organization takes information security seriously

  8. The Challenge of Third-Party Compliance Management

    As the regulatory landscape becomes more complex, many organizations lack resources to conduct a complete compliance program

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  9. Your Employees Are Reusing Passwords – Find Out How Many

    Do you know your employees’ personal passwords? Well, you actually might!

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  10. Busting the Top Myths About Privileged Access Management

    PAM solutions are a critical layer of defense

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  11. Exposed Code in Contact Tracing Apps: Copycats and Worse

    Attack scenarios share a common characteristic: the ability to tamper with the integrity of contact tracing apps.

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  12. Password Resets and the Remote Workforce: A Security Disaster Waiting to Happen

    In light of the COVID-19 pandemic, a new challenge is beginning to arise – the need to change or reset passwords remotely

    1. Photo of Nick Cavalancia

      Nick Cavalancia

      Microsoft Cloud and Datacenter MVP

  13. The Shifting Sands of Data End-of-Life Destruction

    Ever-increasing data volume is driving change in technology and associated compliance regulations

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  14. A View of COVID-19’s First Wave of Cybersecurity

    What we have learned from threats and scams of the first few months of COVID-19

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  15. The Dangers of Running an Unsupported OS

    Running an unsupported OS leaves servers open to problems and attacks

    1. Alexander Vinogradov

      Product Manager, CloudLinux OS

  16. The Ticking Timebomb: Data Breaches from Hardware End-of-Life

    An often-overlooked area of cybersecurity leaves organizations susceptible to data breaches: hardware end-of-life

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  17. Evolving Web Application Supply Chain Threats

    Attention is being turned to the supply chain that makes up modern web applications.

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  18. Cybercrime is Winning – What Are You Going to Do About It?

    Turning the tide in the ongoing battle with cyber-criminals

    1. Photo of Chris Dale

      Chris Dale

      Principal Consultant, River Security and Certified SANS Instructor

  19. A Country in Crisis: Data Privacy in the US

    In today’s data-driven environment, it seems not a day goes by without hearing of a data breach or leak

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  20. Timely Opportunities Exist to Address Longstanding Security Gaps

    Could the other side of the pandemic see green shoots of a skills shortage resolution?

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

What’s Hot on Infosecurity Magazine?