Infosecurity Blogs

  1. Signal From Noise: How to Win Customers and Influence CISOs

    What are CISOs looking for in new products?

    1. Photo of Grace Cassy

      Grace Cassy

      Co-Founder, CyLon

  2. Security by Sector: Two in Five Real Estate Pros Say Industry is Unprepared for Cyber-Attacks

    New research highlights cybersecurity risks and concerns within the real estate sector

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  3. FBI: Israel Used StingRays to Spy on the US

    Cellphone surveillance isn't just a problem for Presidents to worry about

    1. Photo of Marx Maxwell

      Marx Maxwell

      Freelance Writer

  4. Security by Sector: Bad Bots Targeting the E-Commerce Industry

    Research finds e-commerce bot activity is becoming more sophisticated and harder to detect

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. Security Awareness for the Masses

    From an attacker perspective, there are three broad areas of attack

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  6. Security by Sector: Cybercrime Could Impact the Food Processing and Manufacturing Industry

    New research report highlights potential cybersecurity risks facing the food sector

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  7. No Matter Your Perspective on Cybersecurity, Need for SecDevOps is Evident

    The global appreciation of SecDevOps is rather obvious when examining cybersecurity holistically

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  8. Security by Sector: Charity Workers Least Likely to Receive Email Security Training

    Only 11% of charity workers receive regular training on email security risks

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  9. Security by Sector: Jaguar Land Rover & BlackBerry Seek to Improve Security in Manufacturing of Next-Gen Vehicles

    Brands announce deepened partnership to focus on security and safety of intelligent vehicles

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. NIS Directive: One Year On – Has it Been Enough?

    A year on, has the NIS directive achieved its aims?

    1. Photo of Gavin Millard

      Gavin Millard

      Vice President, Products, Tenable

  11. Security by Sector: Young Brits Call for Smartphone Policies and Social Media Lessons in Schools

    Does the education system need new approaches in how it handles technology?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  12. Going Beyond the Gender Gap – Why Diversity is Vital for the Future of Cybersecurity

    By continuing to look in the same place for cybersecurity professionals, we will inevitably continue to find the same things

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  13. Rationalizing the Security Stack for More Effective Protection

    Rather than investing in ever more solutions, businesses should instead be rationalizing their cybersecurity stack

    1. Photo of David Atkinson

      David Atkinson

      Founder and CEO of Senseon

  14. Security by Sector: Cyber-Attackers Targeting the Education System

    Education sector under threat from Adware, Trojans, ransomware and backdoors

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  15. Clash of the Apps

    One of the biggest issues I see these days is the deployment of incident response tools to aid an investigation

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  16. Cybersecurity Certification Training: Uncovering the Truth

    Before placing your trust in a cybersecurity training provider, know the facts

  17. Public and Private Sectors Alike Must Commit to Cybermaturity

    In high-profile cases, there’s a knee-jerk instinct to assign blame

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  18. Mitigating Risks Resulting from M&A

    Best practices observed as infosec teams work through acquisitions

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  19. Who Needs Data Center Security? Everyone

    Data is essential to running a business today

    1. Photo of Dagmara Skomra

      Dagmara Skomra

      Product Manager, Comarch

  20. One CISO’s view on Cyber Startups

    Is it any wonder there are so many startups trying to get attention?

    1. Photo of Alan Jenkins

      Alan Jenkins

      Principal Consultant, thecybrsecnav, CISO-in-Residence, CyLon Labs & ClubCISO Member, CyLon

What’s Hot on Infosecurity Magazine?