Infosecurity Blogs

  1. Security by Sector: Over a Third of Consumers Don’t Trust Digital Comms from Banks

    New survey highlights trust issues surrounding banking-related digital communications

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  2. Implementing Effective Remote Incident Response in a Pandemic

    Whilst workforces are remote, it becomes harder to dispatch traditional Digital Forensics and Incident Response teams to client sites

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  3. Data Security and Decommissioning in a 5G and Streaming World

    For businesses that store and handle data, 5G transition will present costly security risk challenges

    1. Photo of Paul Falcone

      Paul Falcone

      Marketing Coordinator, SEM

  4. Working from Home During #COVID19: Increasing Threats

    Cyber-criminals will always try to capitalize on any significant events happening in the world

  5. Remote Workforces: Security Challenges Amid #COVID19

    Common challenges organizations are facing as they transition their workforce

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  6. Data Destruction and the Environment

    The various challenges the data destruction industry faces across all media types

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  7. Simulating COVID-19 Phishing Emails

    It is ethical to do a phishing simulation exercise at this time?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  8. Closing the Cybersecurity Skill Gap with Education Diversity

    Whether it’s gender, age, ethnicity, class or education level, diversity is about much more than demographics.

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  9. Security by Sector: Kaspersky Makes Security Products Free for Healthcare Institutions Amid #COVID19 Pandemic

    Kaspersky supports healthcare organizations with free, full product licenses for six months

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. Cloud Native Threats: The Role of Infrastructure

    What if cyber-criminals could find a way to simplify the setup of their malicious infrastructures, using an available and resilient architecture?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  11. Improving Cyber-Risk Management with ISO 27001 and the 10 Steps to Cybersecurity

    How the ‘10 steps to cybersecurity’ map with requirements of ISO 27001

  12. Why Physical Data Destruction is Absolutely Vital

    Many people neglect to take proper physical destruction into consideration

    1. Photo of Flora Knolton

      Flora Knolton

      Sales & Marketing Associate, Security Engineered Machinery

  13. Virgin Media Data Breach: What Can Customers Do?

    The failings that enabled the Virgin Media breach, and what options are open to consumers

    1. Photo of Aman Johal

      Aman Johal

      Director and lawyer at Your Lawyers

  14. Where the Cyberspace Solarium Commission Report Succeeded and Could Improve

    The report moves the governments defense of civilization into modern times, but I feel we can do more

    1. Photo of Chris Grove

      Chris Grove

      Technology Evangelist, Nozomi Networks

  15. Best Practices in Designing a Data Decommissioning Policy

    Ensure a proper decommissioning plan to minimize your organization’s chances of falling victim to a breach

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  16. Growing VPN Exploitation Is Cause For Concern

    Attacks are often web application attacks abusing the web frontend that has been extended from VPNs

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  17. Security by Sector: NHS Digital and Egress Partner to Strengthen Healthcare Email Processes

    Move will improve user experience and security in NHSmail

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. Linux Kernel Live Patching: What It Is and Who Needs It

    A background of live patching and the advantages of using it

    1. Mikhail Pobirskiy

      Product Manager, KernelCare

  19. Coronavirus and the Cybersecurity Threat Landscape

    Organizations who survive the fallout will be those that understand how to isolate and insulate their core operations and services.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  20. Security by Sector: 148% Increase in Cyber-Attacks on The Pensions Regulator in 2019

    Email attacks on the pensions sector are on the rise

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s Hot on Infosecurity Magazine?