Infosecurity Blogs

Solving the Cybersecurity Permacrisis

Solving the Cybersecurity Permacrisis

Enterprises that make the time and space for their security staff to learn will achieve much higher levels of security

How Schools Can Become Cyber Resilient in 2023

How Schools Can Become Cyber Resilient in 2023

Threat actors continue to target schools and the data they hold. This article provides advice and tips on how they cany protect themselves from an attack.

Microsoft 365 Apps Continue to be the Most Exploited Cloud Services

Microsoft 365 Apps Continue to be the Most Exploited Cloud Services

As attacks on cloud applications grow, it is essential that businesses gain greater visibility over their cloud infrastructure

Data Protection is the Heart of Zero Trust, Forrester Reports

Data Protection is the Heart of Zero Trust, Forrester Reports

Fasoo's Ron Arden analyses Forrester's latest report, The Definition of Modern Zero Trust

Brought to you by
Fasoo

Protecting Your Business as DDoS Attacks Set to Surge

Protecting Your Business as DDoS Attacks Set to Surge

From politically motivated efforts to ransom extortion, nobody is safe from getting hit by a DDoS attack.

Brought to you by
StormWall

ID Authentication Bypass and the Next Evolution in Phishing Campaigns

ID Authentication Bypass and the Next Evolution in Phishing Campaigns

New insights highlight the sophistication of modern phishing packages available to budding fraudsters

The Increasingly Complex Threat Landscape Must Be Fought With Simplicity

The Increasingly Complex Threat Landscape Must Be Fought With Simplicity

New research shows that 65% of UK and US CI organizations have fallen victim to a cyber-attack

Brought to you by
Forcepoint

Interactive Malware Sandbox in Your Security System

Interactive Malware Sandbox in Your Security System

Understand how to overcome the issues of traditional antiviruses with an online malware sandbox

Brought to you by
ANY.RUN

Template Injection Attacks: Mitigating Modern Threats

Template Injection Attacks: Mitigating Modern Threats

The Menlo Labs Team has recently observed a spike in template injection attacks

An Analysis of Security Vulnerability Trends During COVID-19

An Analysis of Security Vulnerability Trends During COVID-19

What were the security vulnerability trends during COVID-19?

Why Zero Trust and Identity and Access Management are Essential to Enterprise Security

Why Zero Trust and Identity and Access Management are Essential to Enterprise Security

Discover why turning to Zero Trust is important to be able to secure an organization's operations

Brought to you by
SecureLink

Combating CNI Security Concerns in a Complex Climate

Combating CNI Security Concerns in a Complex Climate

An attack on critical infrastructure remains an ongoing concern for cybersecurity professionals and there is a need for best practices to be followed

Brought to you by
Forcepoint

Our Bloggers

What’s Hot on Infosecurity Magazine?