Infosecurity Blogs

  1. How to Prevent Your Business From Being Hacked

    All businesses consider the risks of having weak password controls and the effects of password spraying

    1. Photo of Jason Hart

      Jason Hart

      CTO EMEA, Rapid7

  2. Security by Sector: Travel and Hospitality Industries Extend Security-Sharing Community

    Travel & Hospitality ISAC becomes part of Retail & Hospitality ISAC to strengthen cybersecurity in travel and hospitality sectors

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  3. Managing Customer Identity in the Era of CCPA

    It has most been a confusing and often stressful process for privacy, legal, and risk teams to track.

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  4. How 2019’s Worst Corporate Hacks Could Have Been Prevented

    The majority of breaches can be avoided

    1. Photo of István Molnár

      István Molnár

      Security & Compliance Specialist, Tresorit

  5. The Seven Real Security Predictions

    Ways to help you navigate the next decade of cybersecurity threats as we enter 2020.

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  6. Bringing the Human Element to Life at #RSAC 2020

    While industry leaders are busy reflecting on the events of 2019 and thinking about what is to come for 2020, the RSA Conference team is firming up a rock-solid agenda.

  7. 2020 Trends: Less is More in Security

    To secure an organization, security tools must be made more resilient and the structure more transparent

    1. Photo of Dagmara Skomra

      Dagmara Skomra

      Product Manager, Comarch

  8. Making the Case for Physical Security

    ISO 27001 certification is a viable solution to mitigate all information security risk

  9. Year in Review: Malware and Ransomware

    As these attacks become more targeted, information and intelligence sharing between organizations as well as automation and machine learning is critical

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  10. Year in Review: Cloud Security

    Five New Year's Resolutions for Cloud Security

    1. Photo of Mike Campfield

      Mike Campfield

      VP, GM of International and Global Security Programs, Extrahop

  11. Year in Review: Social Engineering Attacks

    The better attackers understand their target, the more effective social engineering becomes

    1. Photo of Ryan Kalember

      Ryan Kalember

      SVP of Cybersecurity, Proofpoint

  12. Year in Review: Automation

    Using integration to take security automation from blunt object to surgical instrument

    1. Photo of Sri Sundaralingam

      Sri Sundaralingam

      Vice President of Product Marketing, Extrahop

  13. The Cybersecurity Doomsday Clock: What Time is it?

    There is no such thing as perfect security.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  14. Year in Review: Need for Better Security Effectiveness

    Incidents throughout the year demonstrated security’s key role in core business functions

    1. Photo of Robert Potter

      Robert Potter

      Chief Revenue Officer for Verodin

  15. Year in Review: Zero Trust

    Zero trust places emphasis on access and authentication management

    1. Photo of Matt Lock

      Matt Lock

      UK Technical Director, Varonis

  16. Security by Sector: Nozomi Networks Teams with IBM to Secure Industrial Infrastructure

    Firms seek to address global demand for converged OT and IT security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  17. Year in Review: DNS Security

    2019 saw the emergence of two new DNS security standards designed to make the internet safer for consumers and businesses alike

    1. Photo of Paul Adair

      Paul Adair

      Principal Product Manager, Infoblox

  18. Year in Review: Cybercrime

    A review of the cost and impact of cybercrime in 2019

    1. Photo of Carolyn Crandall

      Carolyn Crandall

      Chief Deception Officer and CMO, Attivo Networks

  19. Strategies to get ahead of an Incident

    What should organizations be doing to mitigate attacks and provide a way to respond when the worse happens?

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  20. Looking Back at Microsoft Ignite 2019 - Tech Intensity, End to End Security and AI

    Key notes from Microsoft Ignite 2019

    1. Photo of Stephen McCulloch

      Stephen McCulloch

      Lead Infrastructure Architect, Reed Exhibitions

What’s Hot on Infosecurity Magazine?