Infosecurity Blogs

Exposed Code in Contact Tracing Apps: Copycats and Worse

Exposed Code in Contact Tracing Apps: Copycats and Worse

Attack scenarios share a common characteristic: the ability to tamper with the integrity of contact tracing apps.

Password Resets and the Remote Workforce: A Security Disaster Waiting to Happen

Password Resets and the Remote Workforce: A Security Disaster Waiting to Happen

In light of the COVID-19 pandemic, a new challenge is beginning to arise – the need to change or reset passwords remotely

Brought to you by
Specops

The Shifting Sands of Data End-of-Life Destruction

The Shifting Sands of Data End-of-Life Destruction

Ever-increasing data volume is driving change in technology and associated compliance regulations

Brought to you by
Security Engineered Machinery

A View of COVID-19’s First Wave of Cybersecurity

A View of COVID-19’s First Wave of Cybersecurity

What we have learned from threats and scams of the first few months of COVID-19

The Dangers of Running an Unsupported OS

The Dangers of Running an Unsupported OS

Running an unsupported OS leaves servers open to problems and attacks

Brought to you by
CloudLinux

The Ticking Timebomb: Data Breaches from Hardware End-of-Life

The Ticking Timebomb: Data Breaches from Hardware End-of-Life

An often-overlooked area of cybersecurity leaves organizations susceptible to data breaches: hardware end-of-life

Brought to you by
Security Engineered Machinery

Evolving Web Application Supply Chain Threats

Evolving Web Application Supply Chain Threats

Attention is being turned to the supply chain that makes up modern web applications.

Cybercrime is Winning – What Are You Going to Do About It?

Cybercrime is Winning – What Are You Going to Do About It?

Turning the tide in the ongoing battle with cyber-criminals

Brought to you by
SANS Institute

A Country in Crisis: Data Privacy in the US

A Country in Crisis: Data Privacy in the US

In today’s data-driven environment, it seems not a day goes by without hearing of a data breach or leak

Brought to you by
Security Engineered Machinery

Timely Opportunities Exist to Address Longstanding Security Gaps

Timely Opportunities Exist to Address Longstanding Security Gaps

Could the other side of the pandemic see green shoots of a skills shortage resolution?

How to Check for Breached Passwords in Active Directory

How to Check for Breached Passwords in Active Directory

It’s never been more important to check for leaked passwords in Active Directory

Brought to you by
Specops

Huawei CSO: Secure Networks Do Not Trust Anyone

Huawei CSO: Secure Networks Do Not Trust Anyone

If the U.S. government wants to forgo a comprehensive approach to risk management and simply seek alternatives to Huawei, it has several options

Our Bloggers

What’s Hot on Infosecurity Magazine?