Infosecurity Blogs

  1. Adaptive Cybersecurity: Strategies for a Resilient Cyberspace

    ISACA's Adham Etoom discusses the driving forces that contribute to building a resilient cyberspace

    1. Photo of Adham Etoom

      Adham Etoom

      Cybersecurity Advisor, Program Manager

  2. How to Mount a Dismounted Exchange Database

    Understand why Exchange Server databases might dismount and methods for remounting them to restore user access to mailboxes and data

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  3. Weaponized Complexity: How AI is Supercharging Cyber Threats

    Cybersecurity is evolving beyond traditional defenses as AI transforms both cybercriminal tactics and the strategies of those defending against them

    1. Photo of Petko Stoyanov

      Petko Stoyanov

      Vice President of Product Strategy, Everfox

  4. Have Your Users’ Credentials Been Leaked on The Dark Web?

    Stolen or leaked credentials are highly valued on the dark web for their ability to provide discreet access to organizations. This makes continuous monitoring and proactive measures crucial to mitigate risks from compromised credentials

    1. Photo of Patrick Lehnis

      Patrick Lehnis

      Marketing Manager, Outpost24

  5. How Can AP Automation Enhance Data Protection In The Information Security Industry?

    AP automation is more than just a tool for streamlining accounts payable processes; it is a powerful ally in the quest for data protection

    1. Photo of Danial Ashraf

      Danial Ashraf

      Senior Publisher, Quadient

  6. How Role-Based Identity Management Can Protect Against AD- And Entra ID-Related Risk

    AD’s widespread use makes it a prime target for cybercriminals, emphasizing the critical need for secure and efficient rights allocation across all stages of an employee's journey

    1. Photo of Andrew Bermender

      Andrew Bermender

      Solutions Architect and Presales Engineer, One Identity

  7. Cybersecurity 2025: Cloudy with a Chance of Breaches

    Javvad Malik highlights the trends he believes will reshape our approach to digital protection in 2025

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  8. Crafting and Refining a Strategic 2025 Cybersecurity Budget

    Sushila Nair sets out the key areas that should be included to craft an effective cybersecurity budget in 2025

    1. Photo of Sushila Nair

      Sushila Nair

      CEO, Cybernetic LLC

  9. When Should Enterprises Use Application Security or Application Security Posture Management?

    Explore the differences between AppSec and ASPM, and how enterprises can choose between them

    1. Photo of Seemant  Sehgal

      Seemant Sehgal

      Founder & CEO, BreachLock

  10. DDoS Attacks: It’s What You Don’t Know That May Hurt You

    Despite having DDoS protection, organizations often lack confidence in their defenses due to a lack of testing, which reveals vulnerabilities and helps refine response strategies

    1. Photo of Ziv Gadot

      Ziv Gadot

      CEO, Red Button

  11. Tech Predictions for 2025’s Frontline Workforce: Secure, Simplify, Optimize

    To optimize cybersecurity investments and prepare workforces for evolving demands, organizations will focus on simplifying current approaches to security through identity and access innovations

    1. Photo of Joel Burleson-Davis

      Joel Burleson-Davis

      SVP Worldwide Engineering, Cyber, Imprivata

  12. The New Cyber Frontier: Managing Risks in Distributed Teams

    Remote work has revolutionized how we collaborate, but what’s the cost of this convenience?

    1. Photo of Saba  Hasan

      Saba Hasan

      Senior Executive, PureVPN

  13. UK Government Invites Industry to Get Behind new UK Cyber Team

    The UK Government, in partnership with SANS Institute, has launched a nationwide competition to find young cybersecurity talent in a Capture-the-Flag style series of gruelling challenges

  14. Why Cybersecurity is Critical in IoT Development Services for a Safer Connected World

    Explore the critical role of cybersecurity in IoT development, the unique challenges IoT poses, and best practices for creating secure IoT solutions

  15. [Fixed]: SQL Server Errors 823, 824, and 825 due to Page Corruption

    Understand common causes behind corruption in pages and the methods to resolve the SQL Server errors 823, 824, and 825

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  16. NIS2 Directive: Everything EU Member States and Organizations Need to Know to Prepare and Comply

    Understand how NIS2 requirements will affect those mandated industries, and what security providers can do to help them prepare and comply

    1. Photo of Seemant  Sehgal

      Seemant Sehgal

      Founder & CEO, BreachLock

  17. It’s a Hard Time to Be a CISO. Transformational Leadership Is More Important Than Ever

    By adopting a transformational leadership approach, CISOs can take proactive steps to protect their organization (and themselves) from the ripple effects of an accelerating threat landscape

    1. Photo of Frank Kim

      Frank Kim

      SANS Fellow, SANS Institute

  18. Protecting Customer Data with AI Powered CIAM and IGA

    AI-powered strategies can help companies protect customer data, reduce breach risks, and maintain regulatory compliance, fostering trust in the digital age

    1. Photo of Bruce Esposito

      Bruce Esposito

      Product Marketing IGA, One Identity

  19. The State of Cybersecurity: Challenges, Priorities and Insights

    ISACA's Adham Etoom highlights key findings from ISACA's 2024 State of Cybersecurity report, including rising stress levels, skills shortages and budgetary constraints

    1. Photo of Adham Etoom

      Adham Etoom

      Cybersecurity Advisor, Program Manager

  20. Balancing Clients' Security and Functionality in the Cloud

    To ensure the security status of CIS Hardened Images, CIS conducted testing with Azure Monitor Agent and Azure Update Manager, and this blog will discuss the significance, findings, and future plans of this initiative

    1. Photo of Mia Lavada

      Mia Lavada

      Product Manager, Center for Internet Security

What’s Hot on Infosecurity Magazine?