Infosecurity Blogs

  1. Security by Sector: Bad Bots Targeting the E-Commerce Industry

    Research finds e-commerce bot activity is becoming more sophisticated and harder to detect

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  2. Security Awareness for the Masses

    From an attacker perspective, there are three broad areas of attack

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  3. Security by Sector: Cybercrime Could Impact the Food Processing and Manufacturing Industry

    New research report highlights potential cybersecurity risks facing the food sector

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  4. No Matter Your Perspective on Cybersecurity, Need for SecDevOps is Evident

    The global appreciation of SecDevOps is rather obvious when examining cybersecurity holistically

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  5. Security by Sector: Charity Workers Least Likely to Receive Email Security Training

    Only 11% of charity workers receive regular training on email security risks

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  6. Security by Sector: Jaguar Land Rover & BlackBerry Seek to Improve Security in Manufacturing of Next-Gen Vehicles

    Brands announce deepened partnership to focus on security and safety of intelligent vehicles

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  7. NIS Directive: One Year On – Has it Been Enough?

    A year on, has the NIS directive achieved its aims?

    1. Photo of Gavin Millard

      Gavin Millard

      Vice President, Products, Tenable

  8. Security by Sector: Young Brits Call for Smartphone Policies and Social Media Lessons in Schools

    Does the education system need new approaches in how it handles technology?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  9. Going Beyond the Gender Gap – Why Diversity is Vital for the Future of Cybersecurity

    By continuing to look in the same place for cybersecurity professionals, we will inevitably continue to find the same things

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  10. Rationalizing the Security Stack for More Effective Protection

    Rather than investing in ever more solutions, businesses should instead be rationalizing their cybersecurity stack

    1. Photo of David Atkinson

      David Atkinson

      Founder and CEO of Senseon

  11. Security by Sector: Cyber-Attackers Targeting the Education System

    Education sector under threat from Adware, Trojans, ransomware and backdoors

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  12. Clash of the Apps

    One of the biggest issues I see these days is the deployment of incident response tools to aid an investigation

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  13. Cybersecurity Certification Training: Uncovering the Truth

    Before placing your trust in a cybersecurity training provider, know the facts

  14. Public and Private Sectors Alike Must Commit to Cybermaturity

    In high-profile cases, there’s a knee-jerk instinct to assign blame

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  15. Mitigating Risks Resulting from M&A

    Best practices observed as infosec teams work through acquisitions

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  16. Who Needs Data Center Security? Everyone

    Data is essential to running a business today

    1. Photo of Dagmara Skomra

      Dagmara Skomra

      Product Manager, Comarch

  17. One CISO’s view on Cyber Startups

    Is it any wonder there are so many startups trying to get attention?

    1. Photo of Alan Jenkins

      Alan Jenkins

      Principal Consultant, thecybrsecnav, CISO-in-Residence, CyLon Labs & ClubCISO Member, CyLon

  18. Cloudflare and the Art of Owning Your Mistakes

    A lot can be learned from the recent Cloudflare episode.

    1. Photo of Sascha Giese

      Sascha Giese

      Head Geek, SolarWinds

  19. Key Security Tactics to Ensure CISOs Don’t Have a Terrible Day

    How using the right software security tools and methodologies can make for a better day

    1. Photo of Derek Handova

      Derek Handova

      Senior technical writer, Synopsys

  20. Protect Your Organization Against Password Spraying

    Password spraying, unlike traditional brute force attacks, often stays under the radar

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

What’s Hot on Infosecurity Magazine?