Infosecurity Blogs

  1. Security by Sector: Online Banking Resource Center Launched to Fight #COVID19 Fraud

    Free service allows users to check whether COVID-19 emails, SMS messages and social posts are banking scams

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  2. Click Here to Find Out Who Falls for Scams

    What persuaded you to click was most likely some form of social proof.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  3. Why Data Centers Need Formal Data End-of-Life Processes

    Data centers are at the heart of both the problem and solution regarding sensitive data storage

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  4. Security by Sector: Over a Third of Consumers Don’t Trust Digital Comms from Banks

    New survey highlights trust issues surrounding banking-related digital communications

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. Implementing Effective Remote Incident Response in a Pandemic

    Whilst workforces are remote, it becomes harder to dispatch traditional Digital Forensics and Incident Response teams to client sites

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  6. Data Security and Decommissioning in a 5G and Streaming World

    For businesses that store and handle data, 5G transition will present costly security risk challenges

    1. Photo of Paul Falcone

      Paul Falcone

      Marketing Coordinator, SEM

  7. Working from Home During #COVID19: Increasing Threats

    Cyber-criminals will always try to capitalize on any significant events happening in the world

  8. Remote Workforces: Security Challenges Amid #COVID19

    Common challenges organizations are facing as they transition their workforce

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  9. Data Destruction and the Environment

    The various challenges the data destruction industry faces across all media types

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  10. Simulating COVID-19 Phishing Emails

    It is ethical to do a phishing simulation exercise at this time?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  11. Closing the Cybersecurity Skill Gap with Education Diversity

    Whether it’s gender, age, ethnicity, class or education level, diversity is about much more than demographics.

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  12. Security by Sector: Kaspersky Makes Security Products Free for Healthcare Institutions Amid #COVID19 Pandemic

    Kaspersky supports healthcare organizations with free, full product licenses for six months

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. Cloud Native Threats: The Role of Infrastructure

    What if cyber-criminals could find a way to simplify the setup of their malicious infrastructures, using an available and resilient architecture?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  14. Improving Cyber-Risk Management with ISO 27001 and the 10 Steps to Cybersecurity

    How the ‘10 steps to cybersecurity’ map with requirements of ISO 27001

  15. Why Physical Data Destruction is Absolutely Vital

    Many people neglect to take proper physical destruction into consideration

    1. Photo of Flora Knolton

      Flora Knolton

      Sales & Marketing Associate, Security Engineered Machinery

  16. Virgin Media Data Breach: What Can Customers Do?

    The failings that enabled the Virgin Media breach, and what options are open to consumers

    1. Photo of Aman Johal

      Aman Johal

      Director and lawyer at Your Lawyers

  17. Where the Cyberspace Solarium Commission Report Succeeded and Could Improve

    The report moves the governments defense of civilization into modern times, but I feel we can do more

    1. Photo of Chris Grove

      Chris Grove

      Technology Evangelist, Nozomi Networks

  18. Best Practices in Designing a Data Decommissioning Policy

    Ensure a proper decommissioning plan to minimize your organization’s chances of falling victim to a breach

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  19. Growing VPN Exploitation Is Cause For Concern

    Attacks are often web application attacks abusing the web frontend that has been extended from VPNs

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  20. Security by Sector: NHS Digital and Egress Partner to Strengthen Healthcare Email Processes

    Move will improve user experience and security in NHSmail

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s Hot on Infosecurity Magazine?