Infosecurity Blogs

  1. Continuous Learning is the Only Path to the Next 50 Years in Technology

    How technology has evolved since the foundation of ISACA 50 years ago, and what the next half century could look like.

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  2. Cybersecurity: Billions Pour In, Basics Languish

    2018’s headlines only underscored the need for robust data security with over 2 billion records stolen.

    1. Photo of Ken Mafli

      Ken Mafli

      Senior Digital Marketing Manager at Townsend Security

  3. How to Get Cybersecurity Right in 2019

    Cybercrime losses continue to go up, but spending does not match the figures. What needs to be changed to balance the numbers out?

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  4. 2019 Predictions: Part Three

    As 2018 draws to a close, the industry turns its thoughts to next year and preparing for the trends, threats and challenges that 2019 might have in store

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. Time: An Attacker’s Best Friend

    Analysis of the 'staggering' breach at Marriott, and what made the attack unique.

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  6. 2019 Predictions: Part Two

    As 2018 draws to a close, the industry turns its thoughts to next year and preparing for the trends, threats and challenges that 2019 might have in store

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  7. 2019 Predictions: Part One

    As 2018 draws to a close, the industry turns its thoughts to next year and preparing for the trends, threats and challenges that 2019 might have in store

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  8. The TrickBot and MikroTik Connection – A Story of Investment and Collaboration

    The increasing involvement of MikroTik hosts in malicious activity.

    1. Photo of Wicus Ross

      Wicus Ross

      Lead Security Researcher, SecureData Labs

  9. Are Lawyers the Best Judge of Cybersecurity?

    It's not just lawmakers who sometimes seem ill equipped when it comes to cybersecurity; lawyers can be far from perfect in this regard too.

    1. Photo of John Safa

      John Safa

      Founder and CTO of Pushfor

  10. The Importance of "S" in "CISO"

    As cybersecurity has become the need of the business, we turn to our management for guidance from a CISO.

    1. Photo of Vaishali Vuppu

      Vaishali Vuppu

      Cybersecurity Enthusiast

  11. MIT’s Investment in AI a Harbinger of What is to Come

    MIT is boldly investing in preparing students for a world that will be recalibrated by AI.

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  12. Cranes Exposed to Possible Cyber-Sabotage—What We Can Learn

    Why the scenario of a hacked crane is a concern for wider cybersecurity.

    1. Photo of Ken Mafli

      Ken Mafli

      Senior Digital Marketing Manager at Townsend Security

  13. Enterprises Need to Stop Playing Catch-Me-If-You-Can With Their Containers

    Many enterprises aren’t even aware that they have deployed containers and orchestrated containerization.

    1. Photo of Gavin Millard

      Gavin Millard

      Vice President, Products, Tenable

  14. Deceptioneering Part 2: Principles of Deception

    Once you have a foundational knowledge of Deceptioneering, it is important to look at some practical applications.

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  15. Deceptioneering Part 1: Humans are Hardwired for Deception

    The first part of a look at “Deceptioneering” and why human beings are so apt to fall for trickery.

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  16. A Strategic Approach to Improving Organizational Cyber Culture

    What are organizations doing to make good cyber practices an everyday part of their regular activities?

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  17. Could 2019 be the End of Cookie Consent Forms?

    How the upcoming ePrivacy Regulation will change the current Cookie law.

    1. Photo of Paul Bischoff

      Paul Bischoff

      Privacy advocate at Comparitech.com

  18. Patching and Policy Lessons Learned from WannaCry

    IT and cybersecurity professionals that don’t make patching a priority are essentially shining a light on their organization’s weaknesses.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  19. A Step in the Right Direction for Small Business Cybersecurity

    The NIST Small Business Cybersecurity Act will help organizations gain access to mechanisms that only seemed attainable by larger, better-resourced organizations.

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  20. Open Banking to Close Gaps

    As UK banks open their data via secure APIs, third-party providers will be required to adopt security-oriented approaches to enhance the Open Banking initiative’s objective of closing any security gaps.

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

What’s Hot on Infosecurity Magazine?