Infosecurity Blogs

  1. Security by Sector: Medical IoT Gets Much Needed Dose of Cybersecurity

    Connected healthcare devices are a serious security risk, but a new virtual segmentation capability seeks to boost medical IoT

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  2. Combatting Coronavirus Phishing and Malware Attacks

    As the virus becomes more widespread, we’re likely to see similar tactics used

    1. Photo of Will LaSala

      Will LaSala

      Senior Director of Global Solutions, OneSpan

  3. The Calm After the Storm

    How to start your preparation as part of the “lessons learned” of an incident

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  4. Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

    AI, 5G and Blockchain considered important investments for improving quality of credit data and decision-making

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. PCI Compliance: Not a Password Security Guarantee

    How to exceed PCI password requirements to become more secure

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  6. Ryuk: Defending Against This Increasingly Busy Ransomware Family

    The incident at the MTSA-regulated facility is just one of the latest attacks to involve Ryuk.

    1. Photo of Richard Henderson

      Richard Henderson

      Head of Global Threat Intelligence, Lastline

  7. Security by Sector: Cyber-Attack Could Create Financial Crisis, Says ECB Chief

    European Central Bank’s president highlights potential impact of cyber-attacks on banks

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  8. Nine Steps to Cybersecurity

    What needs to be secured, why and how to rise to the challenge

    1. Photo of Dagmara Skomra

      Dagmara Skomra

      Product Manager, Comarch

  9. Let’s Not Wait for Crises Before Prioritizing Safeguards for AI

    Just because AI provides the capability to do something does not mean it should be done

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  10. Security by Sector: Synopsys and Finastra Partner to Secure Financial Services App Ecosystem

    Financial services sector gets a boost of app security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  11. Using the Cloud: Seven Top Security Threats to Know About

    How to ensure security in the cloud

    1. Photo of Dagmara Skomra

      Dagmara Skomra

      Product Manager, Comarch

  12. Why the Travelex Incident Portends the Changing Nature of Ransomware

    It’s no longer simplistic ransomware, but bigfish extortion

    1. Photo of Mark Sangster

      Mark Sangster

      VP and Industry Security Strategist, eSentire

  13. Sustaining Security Talent: A Big Challenge for CISOs

    Security engineers are hard to come by

    1. Photo of Charlie  Eriksen

      Charlie Eriksen

      CTO, Adversary

  14. Big Data, Big Risks: Addressing the High-Tech & Telecoms Threat Landscape

    Addressing the high-tech and telecoms threat landscape

  15. Security by Sector: Healthcare Orgs Continue to Suffer Security Headaches

    Healthcare industry still having a torrid time when it comes to information security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  16. The Helpful Hack That Started It All

    Attacks can be devastating, but can also provide unexpected silver linings in the form of increased security and safer communication

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  17. Setting the Stage for Innovation at #RSAC 2020

    Some of the Innovation Programs attendees can look forward to this year

  18. How to Prevent Your Business From Being Hacked

    All businesses consider the risks of having weak password controls and the effects of password spraying

    1. Photo of Jason Hart

      Jason Hart

      CTO EMEA, Rapid7

  19. Security by Sector: Travel and Hospitality Industries Extend Security-Sharing Community

    Travel & Hospitality ISAC becomes part of Retail & Hospitality ISAC to strengthen cybersecurity in travel and hospitality sectors

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  20. Managing Customer Identity in the Era of CCPA

    It has most been a confusing and often stressful process for privacy, legal, and risk teams to track.

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

What’s Hot on Infosecurity Magazine?