Infosecurity Blogs

  1. Evolving Web Application Supply Chain Threats

    Attention is being turned to the supply chain that makes up modern web applications.

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  2. Cybercrime is Winning – What Are You Going to Do About It?

    Turning the tide in the ongoing battle with cyber-criminals

    1. Photo of Chris Dale

      Chris Dale

      Principal Consultant, River Security and Certified SANS Instructor

  3. A Country in Crisis: Data Privacy in the US

    In today’s data-driven environment, it seems not a day goes by without hearing of a data breach or leak

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  4. Timely Opportunities Exist to Address Longstanding Security Gaps

    Could the other side of the pandemic see green shoots of a skills shortage resolution?

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  5. How to Check for Breached Passwords in Active Directory

    It’s never been more important to check for leaked passwords in Active Directory

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  6. Huawei CSO: Secure Networks Do Not Trust Anyone

    If the U.S. government wants to forgo a comprehensive approach to risk management and simply seek alternatives to Huawei, it has several options

    1. Photo of Andy Purdy

      Andy Purdy

      CSO, Huawei

  7. Who is Responsible for End-of-Life Data Destruction?

    End-of-life data destruction should not be an additional responsibility heaped on an IT team

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  8. Security by Sector: Insecure Data Sharing Practices Putting Educational Orgs at Risk

    Survey finds 82% of educational organizations do not track data sharing at all or do it manually

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  9. Cloud-Native Threats in the COVID-19 Pandemic

    Shadow traffic poses a serious risk as it isn’t inspected and creates a gate to corporate resources.

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  10. Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’

    No one handling sensitive data should become complacent or take a lax approach to the security of sensitive data

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  11. Security by Sector: Online Banking Resource Center Launched to Fight #COVID19 Fraud

    Free service allows users to check whether COVID-19 emails, SMS messages and social posts are banking scams

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  12. Click Here to Find Out Who Falls for Scams

    What persuaded you to click was most likely some form of social proof.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  13. Why Data Centers Need Formal Data End-of-Life Processes

    Data centers are at the heart of both the problem and solution regarding sensitive data storage

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  14. Security by Sector: Over a Third of Consumers Don’t Trust Digital Comms from Banks

    New survey highlights trust issues surrounding banking-related digital communications

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  15. Implementing Effective Remote Incident Response in a Pandemic

    Whilst workforces are remote, it becomes harder to dispatch traditional Digital Forensics and Incident Response teams to client sites

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  16. Data Security and Decommissioning in a 5G and Streaming World

    For businesses that store and handle data, 5G transition will present costly security risk challenges

    1. Photo of Paul Falcone

      Paul Falcone

      Marketing Coordinator, SEM

  17. Working from Home During #COVID19: Increasing Threats

    Cyber-criminals will always try to capitalize on any significant events happening in the world

  18. Remote Workforces: Security Challenges Amid #COVID19

    Common challenges organizations are facing as they transition their workforce

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  19. Data Destruction and the Environment

    The various challenges the data destruction industry faces across all media types

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  20. Simulating COVID-19 Phishing Emails

    It is ethical to do a phishing simulation exercise at this time?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

What’s Hot on Infosecurity Magazine?