Infosecurity Blogs

Working from Home During #COVID19: Increasing Threats
Cyber-criminals will always try to capitalize on any significant events happening in the world

Remote Workforces: Security Challenges Amid #COVID19
Common challenges organizations are facing as they transition their workforce

Data Destruction and the Environment
The various challenges the data destruction industry faces across all media types

Simulating COVID-19 Phishing Emails
It is ethical to do a phishing simulation exercise at this time?

Closing the Cybersecurity Skill Gap with Education Diversity
Whether it’s gender, age, ethnicity, class or education level, diversity is about much more than demographics.

Security by Sector: Kaspersky Makes Security Products Free for Healthcare Institutions Amid #COVID19 Pandemic
Kaspersky supports healthcare organizations with free, full product licenses for six months

Cloud Native Threats: The Role of Infrastructure
What if cyber-criminals could find a way to simplify the setup of their malicious infrastructures, using an available and resilient architecture?

Improving Cyber-Risk Management with ISO 27001 and the 10 Steps to Cybersecurity
How the ‘10 steps to cybersecurity’ map with requirements of ISO 27001

Why Physical Data Destruction is Absolutely Vital
Many people neglect to take proper physical destruction into consideration

Virgin Media Data Breach: What Can Customers Do?
The failings that enabled the Virgin Media breach, and what options are open to consumers

Where the Cyberspace Solarium Commission Report Succeeded and Could Improve
The report moves the governments defense of civilization into modern times, but I feel we can do more

Best Practices in Designing a Data Decommissioning Policy
Ensure a proper decommissioning plan to minimize your organization’s chances of falling victim to a breach

Growing VPN Exploitation Is Cause For Concern
Attacks are often web application attacks abusing the web frontend that has been extended from VPNs

Security by Sector: NHS Digital and Egress Partner to Strengthen Healthcare Email Processes
Move will improve user experience and security in NHSmail

Linux Kernel Live Patching: What It Is and Who Needs It
A background of live patching and the advantages of using it

Coronavirus and the Cybersecurity Threat Landscape
Organizations who survive the fallout will be those that understand how to isolate and insulate their core operations and services.

Security by Sector: 148% Increase in Cyber-Attacks on The Pensions Regulator in 2019
Email attacks on the pensions sector are on the rise

Women in Cybersecurity Keynote: Bobbie Stempfley Shares Invaluable Career Advice
Bobbie Stempfley delivered an inspirational keynote presentation at the Infosecurity Magazine Women in Cybersecurity networking breakfast event in San Francisco

Meeting SOC 2 Compliance With Your Own Products
Getting SOC 2 compliance is tough, keeping it is tougher

Why Our Infosecurity Women in Cybersecurity Networking Event Isn’t About Women in Cybersecurity
Infosecurity is preparing for it's fourth women in cybersecurity networking event – the first to be run Stateside















