Infosecurity Blogs

  1. Behind the Scenes & in Front of the Attack: The Largest DDoS Attack on Record

    An attack large enough to take many countries offline, yet it was over before it ever got a chance to do harm

  2. The Rise of Account Takeover Fraud in the Media Industry

    A robust criminal ecosystem is acting as a parasite on the wave of content shifting to OTT delivery models

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  3. On-Prem WAFs: Lacking the Scale & Flexibility to Thwart Today’s Threats

    A cloud-based security solution that is deployed at the edge of the network is in greater demand, and driving the market

  4. Security: a Missing Ingredient in Many DevOps Implementations

    The most successful organizations of the future will make DevSecOps a cornerstone of their business operations

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  5. The Security Landscape is Constantly Evolving: Are You Ready?

    The one certainty in the world of cybersecurity is that change is imminent

  6. Micro-Segmentation: A Solid Security Requirement in a Turbulent Environment

    The need for micro-segmentation as a security solution is not new

    1. Photo of Sharon  Besser

      Sharon Besser

      Vice-President of Products, Guardicore

  7. Incident Response: Endgame

    What incident response lessons can we learn from the latest Marvel episode?

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  8. Understanding ICO Password Recommendations

    Passwords may be a small part of GDPR requirements, but they also represent the easiest way to gain unauthorized access to personally identifiable data

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  9. Perspective Changes Everything: Shift Your Focus to the Edge

    There was a time when you could build a virtual wall and protect anything inside a data center – but times have changed

  10. Survival of the Fittest: Take Security to the Edge

    Deploying security at the edge allows you to keep pace with a complex and constantly changing digital ecosystem

  11. Password Requirements from NCSC & Cyber Essentials

    Simplify passwords for users and put the burden on the authentication system

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  12. How Embracing Micro-Segmentation Helps You Master PCI Compliance

    The art of mastering PCI DSS compliance is primarily about defining the scope of compliance

    1. Photo of Dave Klein

      Dave Klein

      Senior Director of Engineering & Architecture, Guardicore

  13. Keeping Innovation Flowing: What Makes a Successful Cyber Startup?

    How can a cybersecurity startup succeed?

    1. Photo of Grace Cassy

      Grace Cassy

      Co-Founder, CyLon

  14. Is Effective Cybersecurity Expensive?

    Whether effective cybersecurity really is very expensive

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  15. Are You Mature Enough to Secure Your Cloud to its Fullest Extent?

    Every organization, whether it’s using on-prem, public cloud, or hybrid cloud architecture, needs a suitable security solution

    1. Photo of Sharon  Besser

      Sharon Besser

      Vice-President of Products, Guardicore

  16. Culture Carriers: Amplifying Your Security Awareness Message

    How a culture carrier can benefit your company

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  17. How to be Secure in the Challenging Business Landscape

    Data security applies in equal measure to start-ups, small- and medium-sized enterprises, and global consortia

    1. Photo of Malgorzata Zabieglinska–Lupa

      Malgorzata Zabieglinska–Lupa

      ICT Product Manager, Comarch

  18. There’s No Day Off for Cybersecurity Professionals

    How can IT professionals continue to juggle multiple roles and tasks?

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  19. The Battle for Cybersecurity Talent Must Include Retention Emphasis

    As companies compete over valuable cybersecurity professionals, retention becomes difficult

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  20. Password Managers - Popular and Safe

    Password managers are safe to use, don't believe the hype

    1. Photo of Gary Williams

      Gary Williams

      IT Infrastructure manager

What’s Hot on Infosecurity Magazine?