Infosecurity Blogs

  1. Double Extortion Ransomware Attacks and the Role of Vulnerable Internet-Facing Systems

    Ransomware attacks are adopting an approach defined as “double extortion"

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  2. Cyberwarfare: the New Frontier of Wars Between Countries

    Cyberwarfare can be launched instantly, making it difficult to counter

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  3. A New Path for Data Protection

    Any organization that is dealing with large amounts of unstructured data should strongly consider microsharding

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  4. Using Self-Service Password Reset Tools to Support Remote Workers

    Password resets have always been problematic for helpdesks

    1. Photo of Brien  Posey

      Brien Posey

      Technology Author and Speaker, 18-time Microsoft MVP

  5. Focus on Continuous Learning, Not Passing Exams

    Continuous learning is done by teaching humans to think for themselves and be creative

    1. Photo of Max  Vetter

      Max Vetter

      Chief Cyber Officer, Immersive Labs

  6. Stop the Cyber-Attack Cycle with Privileged Access Management

    Securing privileged access helps shrink the attack surface

    1. Lavi Lazarovitz

      Head of Security Research, CyberArk

  7. Is the Security Department a Barrier for Progression or are they Misunderstood?

    Is the security team, "The Department of No?"

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  8. Distributed Working Demands New Levels of Data Security at the Edge

    Lockdowns and quarantines have rapidly changed how organisations of all sizes operate

    1. Photo of Maria  Sirbu

      Maria Sirbu

      VP Business Development, Voxility

  9. Migrating On-Premises Email to Office 365: Limitations, Prerequisites and Best Practices

    The critical considerations for migrating an on-premises email organization to Office 365

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  10. Is it Finally the End of Adobe Flash Player?

    With the end of support just a few months away, is it finally the end of the road for this buggy plug-in?

    1. Photo of Adam Palmer

      Adam Palmer

      Chief Cybersecurity Strategist, Tenable

  11. Twitter Hack Exposes Security Holes

    Lessons learned form the recent Twitter breach

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  12. Rethinking Security: The Merging of Personal and Professional

    Steps organizations can take to reduce the security vulnerabilities of distributed workforces

    1. Photo of Mike C Wilson

      Mike C Wilson

      Founder and CTO, PasswordPing

  13. How AI is Becoming Essential to Cyber-Strategy

    Artificial neural networks can allow an AI to self-determine what features it uses to reach a conclusion

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  14. The Russia Report: A Need for Large-Scale National Protective Interventions

    The findings of the ISC’s Russia Report will instigate new investigations and lines of inquiry about government security globally.

    1. Photo of Russell Haworth

      Russell Haworth

      CEO, Nominet

  15. Dangerous Liaisons - Cloudphishing

    The growing adoption (and exploitation) of cloud services requires a cloud-native security approach

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  16. Patching OpenSSL and GNU C Libraries Without Service Restarts

    Organizations in all industries must ensure they are promptly mitigating vulnerabilities to prevent exploitation

    1. Photo of Aleksandra Mitroshkina

      Aleksandra Mitroshkina

      Product Marketing Manager, KernelCare

  17. Data Security and Third-Party IT Asset Disposition: A Paradox

    The only truly secure method of IT asset disposition is in-house drive destruction

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  18. Building Cyber-Maturity Through Understanding Supply Chain Risks

    A holistic approach, with proper management mechanisms in place, can increase cyber-maturity and reduce organizational risk

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  19. NIST Password Guidelines: What You Need to Know

    Organizations’ best line of defense hinges on the ability to ensure security at the password layer

    1. Photo of Josh  Horwitz

      Josh Horwitz

      Chief Operating Officer, Enzoic

  20. Using Trademarks to Combat COVID-19 Related Phishing

    Straightforward domain name procedures can provide efficient relief against fraudulent websites and email.

    1. Photo of Evan Brown

      Evan Brown

      Principal at Much Shelist

What’s Hot on Infosecurity Magazine?