Infosecurity Blogs

  1. Busting the Top Myths About Privileged Access Management

    PAM solutions are a critical layer of defense

    1. Photo of David Higgins

      David Higgins

      senior director, field technology office, CyberArk

  2. Exposed Code in Contact Tracing Apps: Copycats and Worse

    Attack scenarios share a common characteristic: the ability to tamper with the integrity of contact tracing apps.

    1. Photo of Pedro Fortuna

      Pedro Fortuna

      Co-founder and CTO, Jscrambler

  3. Password Resets and the Remote Workforce: A Security Disaster Waiting to Happen

    In light of the COVID-19 pandemic, a new challenge is beginning to arise – the need to change or reset passwords remotely

    1. Photo of Nick Cavalancia

      Nick Cavalancia

      Microsoft Cloud and Datacenter MVP

  4. The Shifting Sands of Data End-of-Life Destruction

    Ever-increasing data volume is driving change in technology and associated compliance regulations

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  5. A View of COVID-19’s First Wave of Cybersecurity

    What we have learned from threats and scams of the first few months of COVID-19

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  6. The Dangers of Running an Unsupported OS

    Running an unsupported OS leaves servers open to problems and attacks

    1. Alexander Vinogradov

      Product Manager, CloudLinux OS

  7. The Ticking Timebomb: Data Breaches from Hardware End-of-Life

    An often-overlooked area of cybersecurity leaves organizations susceptible to data breaches: hardware end-of-life

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  8. Evolving Web Application Supply Chain Threats

    Attention is being turned to the supply chain that makes up modern web applications.

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  9. Cybercrime is Winning – What Are You Going to Do About It?

    Turning the tide in the ongoing battle with cyber-criminals

    1. Photo of Chris Dale

      Chris Dale

      Principal Consultant, River Security and Certified SANS Instructor

  10. A Country in Crisis: Data Privacy in the US

    In today’s data-driven environment, it seems not a day goes by without hearing of a data breach or leak

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  11. Timely Opportunities Exist to Address Longstanding Security Gaps

    Could the other side of the pandemic see green shoots of a skills shortage resolution?

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  12. How to Check for Breached Passwords in Active Directory

    It’s never been more important to check for leaked passwords in Active Directory

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  13. Huawei CSO: Secure Networks Do Not Trust Anyone

    If the U.S. government wants to forgo a comprehensive approach to risk management and simply seek alternatives to Huawei, it has several options

    1. Photo of Andy Purdy

      Andy Purdy

      CSO, Huawei

  14. Who is Responsible for End-of-Life Data Destruction?

    End-of-life data destruction should not be an additional responsibility heaped on an IT team

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  15. Security by Sector: Insecure Data Sharing Practices Putting Educational Orgs at Risk

    Survey finds 82% of educational organizations do not track data sharing at all or do it manually

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  16. Cloud-Native Threats in the COVID-19 Pandemic

    Shadow traffic poses a serious risk as it isn’t inspected and creates a gate to corporate resources.

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  17. Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’

    No one handling sensitive data should become complacent or take a lax approach to the security of sensitive data

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  18. Security by Sector: Online Banking Resource Center Launched to Fight #COVID19 Fraud

    Free service allows users to check whether COVID-19 emails, SMS messages and social posts are banking scams

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  19. Click Here to Find Out Who Falls for Scams

    What persuaded you to click was most likely some form of social proof.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  20. Why Data Centers Need Formal Data End-of-Life Processes

    Data centers are at the heart of both the problem and solution regarding sensitive data storage

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

What’s Hot on Infosecurity Magazine?