Infosecurity Blogs

Your 2017 Data Centre Security Checklist

Your 2017 Data Centre Security Checklist

There is big money to be made extorting an organization’s data center—or “brain”.

#WCSC17: A Day at World Cybersecurity Congress 2017

#WCSC17: A Day at World Cybersecurity Congress 2017

This week Islington’s Business Design Centre played host to the World Cybersecurity Congress 2017, with a schedule packed full of interesting sessions and discussions from speakers from a variety of different sectors and specialties

GDPR Compliance: Time to Face Mission Impossible?

GDPR Compliance: Time to Face Mission Impossible?

The subject of GDPR compliance continues to be on the lips of many in the information security industry, and rightly so as the regulation promises to revolutionize the way we work and store data

The Rise of the Threat Hunter

The Rise of the Threat Hunter

Being proactive, sniffing out threats, and improving detection and response times is vital in the ongoing fight against cyber-attacks. A mix of prevention and response is the ideal strategy.

#SecuriTay 2017 & the Future of An Industry

#SecuriTay 2017 & the Future of An Industry

Held in Dundee’s Abertay University, and now in its sixth year, SecuriTay is organized by the Ethical Hacking Society and “aimed at anyone with an interest in hacking and information security”

Digesting the Diversity of Data Breaches

Digesting the Diversity of Data Breaches

The diverse nature of cyber-threats can make one quite unique from another, affecting every department within an organization and no longer confined to the IT department

Eagles Take the #Superbowl of Passwords

Eagles Take the #Superbowl of Passwords

Based on the release of ten million passwords, the data crunching revealed that the most popular gridiron team for a password was the Philadelphia Eagles, followed by the Dallas Cowboys, Pittsburgh Steelers and Oakland Raiders

Come Fly with Me: Securing the Drone

Come Fly with Me: Securing the Drone

New report seeks to aid the safe and secure creation and operation of unmanned aircraft systems

Ultrasonic Cross-Device Tracking

Ultrasonic Cross-Device Tracking

The Risk Avengers take a look at the issue of ultrasonic cross-device tracking

(ISC)2 - Top Trends to Watch in 2017

(ISC)2 - Top Trends to Watch in 2017

As we enter 2017, this will be the year in which the potential cracks in the pillars of the knowledge economy start to show.

RIG EK Dropping TrickBot Trojan & Madness/Quant Loader DoS Bot

RIG EK Dropping TrickBot Trojan & Madness/Quant Loader DoS Bot

As the exploit market begins to diversify, it has seen the introduction of new threats, the most recent being the inclusion of a relative new comer in TrickLoader and an older threat known as TrickBot

What’s Hot on Infosecurity Magazine?