Infosecurity Blogs

  1. Working from Home During #COVID19: Increasing Threats

    Cyber-criminals will always try to capitalize on any significant events happening in the world

  2. Remote Workforces: Security Challenges Amid #COVID19

    Common challenges organizations are facing as they transition their workforce

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  3. Data Destruction and the Environment

    The various challenges the data destruction industry faces across all media types

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  4. Simulating COVID-19 Phishing Emails

    It is ethical to do a phishing simulation exercise at this time?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  5. Closing the Cybersecurity Skill Gap with Education Diversity

    Whether it’s gender, age, ethnicity, class or education level, diversity is about much more than demographics.

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  6. Security by Sector: Kaspersky Makes Security Products Free for Healthcare Institutions Amid #COVID19 Pandemic

    Kaspersky supports healthcare organizations with free, full product licenses for six months

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  7. Cloud Native Threats: The Role of Infrastructure

    What if cyber-criminals could find a way to simplify the setup of their malicious infrastructures, using an available and resilient architecture?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  8. Improving Cyber-Risk Management with ISO 27001 and the 10 Steps to Cybersecurity

    How the ‘10 steps to cybersecurity’ map with requirements of ISO 27001

  9. Why Physical Data Destruction is Absolutely Vital

    Many people neglect to take proper physical destruction into consideration

    1. Photo of Flora Knolton

      Flora Knolton

      Sales & Marketing Associate, Security Engineered Machinery

  10. Virgin Media Data Breach: What Can Customers Do?

    The failings that enabled the Virgin Media breach, and what options are open to consumers

    1. Photo of Aman Johal

      Aman Johal

      Director and lawyer at Your Lawyers

  11. Where the Cyberspace Solarium Commission Report Succeeded and Could Improve

    The report moves the governments defense of civilization into modern times, but I feel we can do more

    1. Photo of Chris Grove

      Chris Grove

      Technology Evangelist, Nozomi Networks

  12. Best Practices in Designing a Data Decommissioning Policy

    Ensure a proper decommissioning plan to minimize your organization’s chances of falling victim to a breach

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  13. Growing VPN Exploitation Is Cause For Concern

    Attacks are often web application attacks abusing the web frontend that has been extended from VPNs

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  14. Security by Sector: NHS Digital and Egress Partner to Strengthen Healthcare Email Processes

    Move will improve user experience and security in NHSmail

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  15. Linux Kernel Live Patching: What It Is and Who Needs It

    A background of live patching and the advantages of using it

    1. Mikhail Pobirskiy

      Product Manager, KernelCare

  16. Coronavirus and the Cybersecurity Threat Landscape

    Organizations who survive the fallout will be those that understand how to isolate and insulate their core operations and services.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  17. Security by Sector: 148% Increase in Cyber-Attacks on The Pensions Regulator in 2019

    Email attacks on the pensions sector are on the rise

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. Women in Cybersecurity Keynote: Bobbie Stempfley Shares Invaluable Career Advice

    Bobbie Stempfley delivered an inspirational keynote presentation at the Infosecurity Magazine Women in Cybersecurity networking breakfast event in San Francisco

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  19. Meeting SOC 2 Compliance With Your Own Products

    Getting SOC 2 compliance is tough, keeping it is tougher

    1. Leonid Kanter

      IT Director, CloudLinux.

  20. Why Our Infosecurity Women in Cybersecurity Networking Event Isn’t About Women in Cybersecurity

    Infosecurity is preparing for it's fourth women in cybersecurity networking event – the first to be run Stateside

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

What’s Hot on Infosecurity Magazine?