Infosecurity Blogs

  1. How 2019’s Worst Corporate Hacks Could Have Been Prevented

    The majority of breaches can be avoided

    1. Photo of István Molnár

      István Molnár

      Security & Compliance Specialist, Tresorit

  2. The Seven Real Security Predictions

    Ways to help you navigate the next decade of cybersecurity threats as we enter 2020.

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  3. Bringing the Human Element to Life at #RSAC 2020

    While industry leaders are busy reflecting on the events of 2019 and thinking about what is to come for 2020, the RSA Conference team is firming up a rock-solid agenda.

  4. 2020 Trends: Less is More in Security

    To secure an organization, security tools must be made more resilient and the structure more transparent

    1. Photo of Dagmara Skomra

      Dagmara Skomra

      Product Manager, Comarch

  5. Making the Case for Physical Security

    ISO 27001 certification is a viable solution to mitigate all information security risk

  6. Year in Review: Malware and Ransomware

    As these attacks become more targeted, information and intelligence sharing between organizations as well as automation and machine learning is critical

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  7. Year in Review: Cloud Security

    Five New Year's Resolutions for Cloud Security

    1. Photo of Mike Campfield

      Mike Campfield

      VP, GM of International and Global Security Programs, Extrahop

  8. Year in Review: Social Engineering Attacks

    The better attackers understand their target, the more effective social engineering becomes

    1. Photo of Ryan Kalember

      Ryan Kalember

      SVP of Cybersecurity, Proofpoint

  9. Year in Review: Automation

    Using integration to take security automation from blunt object to surgical instrument

    1. Photo of Sri Sundaralingam

      Sri Sundaralingam

      Vice President of Product Marketing, Extrahop

  10. The Cybersecurity Doomsday Clock: What Time is it?

    There is no such thing as perfect security.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  11. Year in Review: Need for Better Security Effectiveness

    Incidents throughout the year demonstrated security’s key role in core business functions

    1. Photo of Robert Potter

      Robert Potter

      Chief Revenue Officer for Verodin

  12. Year in Review: Zero Trust

    Zero trust places emphasis on access and authentication management

    1. Photo of Matt Lock

      Matt Lock

      UK Technical Director, Varonis

  13. Security by Sector: Nozomi Networks Teams with IBM to Secure Industrial Infrastructure

    Firms seek to address global demand for converged OT and IT security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  14. Year in Review: DNS Security

    2019 saw the emergence of two new DNS security standards designed to make the internet safer for consumers and businesses alike

    1. Photo of Paul Adair

      Paul Adair

      Principal Product Manager, Infoblox

  15. Year in Review: Cybercrime

    A review of the cost and impact of cybercrime in 2019

    1. Photo of Carolyn Crandall

      Carolyn Crandall

      Chief Deception Officer and CMO, Attivo Networks

  16. Strategies to get ahead of an Incident

    What should organizations be doing to mitigate attacks and provide a way to respond when the worse happens?

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  17. Looking Back at Microsoft Ignite 2019 - Tech Intensity, End to End Security and AI

    Key notes from Microsoft Ignite 2019

    1. Photo of Stephen McCulloch

      Stephen McCulloch

      Lead Infrastructure Architect, Reed Exhibitions

  18. Year in Review: Security Awareness

    Aware, and beginning to care

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  19. Preparing For The 2019 Holiday Rush: Is Your Web Security Ready?

    It's the most wonderful time to perform final checks to ensure preparedness to withstand common attack vectors

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  20. Choosing the Right Cloud Provider: The Importance of Security Assessments

    Security assessments are important in making purchasing decisions

    1. Photo of István Molnár

      István Molnár

      Security & Compliance Specialist, Tresorit

What’s Hot on Infosecurity Magazine?