Infosecurity Blogs

  1. The Shifting Sands of Data End-of-Life Destruction

    Ever-increasing data volume is driving change in technology and associated compliance regulations

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  2. A View of COVID-19’s First Wave of Cybersecurity

    What we have learned from threats and scams of the first few months of COVID-19

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  3. The Dangers of Running an Unsupported OS

    Running an unsupported OS leaves servers open to problems and attacks

    1. Alexander Vinogradov

      Product Manager, CloudLinux OS

  4. The Ticking Timebomb: Data Breaches from Hardware End-of-Life

    An often-overlooked area of cybersecurity leaves organizations susceptible to data breaches: hardware end-of-life

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  5. Evolving Web Application Supply Chain Threats

    Attention is being turned to the supply chain that makes up modern web applications.

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  6. Cybercrime is Winning – What Are You Going to Do About It?

    Turning the tide in the ongoing battle with cyber-criminals

    1. Photo of Chris Dale

      Chris Dale

      Principal Consultant, River Security and Certified SANS Instructor

  7. A Country in Crisis: Data Privacy in the US

    In today’s data-driven environment, it seems not a day goes by without hearing of a data breach or leak

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  8. Timely Opportunities Exist to Address Longstanding Security Gaps

    Could the other side of the pandemic see green shoots of a skills shortage resolution?

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  9. How to Check for Breached Passwords in Active Directory

    It’s never been more important to check for leaked passwords in Active Directory

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  10. Huawei CSO: Secure Networks Do Not Trust Anyone

    If the U.S. government wants to forgo a comprehensive approach to risk management and simply seek alternatives to Huawei, it has several options

    1. Photo of Andy Purdy

      Andy Purdy

      CSO, Huawei

  11. Who is Responsible for End-of-Life Data Destruction?

    End-of-life data destruction should not be an additional responsibility heaped on an IT team

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  12. Security by Sector: Insecure Data Sharing Practices Putting Educational Orgs at Risk

    Survey finds 82% of educational organizations do not track data sharing at all or do it manually

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. Cloud-Native Threats in the COVID-19 Pandemic

    Shadow traffic poses a serious risk as it isn’t inspected and creates a gate to corporate resources.

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  14. Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’

    No one handling sensitive data should become complacent or take a lax approach to the security of sensitive data

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  15. Security by Sector: Online Banking Resource Center Launched to Fight #COVID19 Fraud

    Free service allows users to check whether COVID-19 emails, SMS messages and social posts are banking scams

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  16. Click Here to Find Out Who Falls for Scams

    What persuaded you to click was most likely some form of social proof.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  17. Why Data Centers Need Formal Data End-of-Life Processes

    Data centers are at the heart of both the problem and solution regarding sensitive data storage

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  18. Security by Sector: Over a Third of Consumers Don’t Trust Digital Comms from Banks

    New survey highlights trust issues surrounding banking-related digital communications

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  19. Implementing Effective Remote Incident Response in a Pandemic

    Whilst workforces are remote, it becomes harder to dispatch traditional Digital Forensics and Incident Response teams to client sites

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  20. Data Security and Decommissioning in a 5G and Streaming World

    For businesses that store and handle data, 5G transition will present costly security risk challenges

    1. Photo of Paul Falcone

      Paul Falcone

      Marketing Coordinator, SEM

What’s Hot on Infosecurity Magazine?