Infosecurity Blogs

  1. Patching and Policy Lessons Learned from WannaCry

    IT and cybersecurity professionals that don’t make patching a priority are essentially shining a light on their organization’s weaknesses.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  2. A Step in the Right Direction for Small Business Cybersecurity

    The NIST Small Business Cybersecurity Act will help organizations gain access to mechanisms that only seemed attainable by larger, better-resourced organizations.

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  3. Open Banking to Close Gaps

    As UK banks open their data via secure APIs, third-party providers will be required to adopt security-oriented approaches to enhance the Open Banking initiative’s objective of closing any security gaps.

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  4. EU Cybersecurity Certification: a Missed Opportunity

    What about a standard for products, will the EU cybersecurity certification framework be a positive thing?

    1. Photo of Ken Munro

      Ken Munro

      Partner, Pen Test Partners

  5. CISOs Reveal the Most Likely Culprits for Data Leaks

    Data security issues can be profoundly damaging. How can your organization avoid them?

    1. Photo of Jeremy Schaller

      Jeremy Schaller

      Industry Analyst at Exit Technologies

  6. Artificial Intelligence Risks Call For Fresh Approaches, Expanded Collaboration

    Time-tested approaches remain important, but traditional methodology will not be enough when it comes to artificial intelligence's potential impact.

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  7. Enter Crowdsourced Security, the Future of Pen Testing?

    If crowdsourced security actually tackles the weaknesses in pen testing effectively.

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  8. Is it Time to Replace Pen Testing with Crowdsourced security?

    As crowdsourced security emerges, are we ready to throw away pen testing as a methodology?

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  9. So I've Removed Admin Rights...What Now?

    Restricting user admin rights is just one important part of improving data security.

    1. Photo of Andrew Avanessian

      Andrew Avanessian

      Chief operating officer at Avecto

  10. Tanium Versus Tachyon: The Big Beasts of the Endpoint Detection and Remediation Jungle go Head-To-Head

    Failure to research next generation EDR tools can result in buying a solution unsuited to today’s workplace.

    1. Photo of Corné Human

      Corné Human

      Senior Product Marketing Manager

  11. To Reward, or Not to Reward

    Many CSOs have resorted to incentives and punishments to enhance employee reporting of suspect emails and cyber activities, but which of these really work?

    1. Photo of Arun Vishwanath

      Arun Vishwanath

      Researcher, Author, Technologist

  12. Should We be Looking Down Under to Improve Our Security?

    Organizations that can implement the Essential Eight measures are more likely to be secure against an online assault.

    1. Photo of Andrew Avanessian

      Andrew Avanessian

      Chief operating officer at Avecto

  13. What Can the World Cup Teach Us About Cybersecurity?

    Just like with World Cup results, in cybersecurity it is not always the team with the strongest players or the best technical strategy that wins.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  14. Back to the Basics - Why we Shouldn't Discount the Lessons of the Cyber Essentials Scheme

    How the Cyber Essentials scheme can aid your cybersecurity resiliency.

    1. Photo of Andrew Avanessian

      Andrew Avanessian

      Chief operating officer at Avecto

  15. Security Culture has to be Intentional and Sustainable

    Your security culture is – and will always be – a subcomponent of your larger organizational culture.

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  16. The Perils of Full Administrator Rights

    Gaining access to administrative rights is one of the most potent weapons for any malicious agent

    1. Photo of Andrew Avanessian

      Andrew Avanessian

      Chief operating officer at Avecto

  17. Why is the Lucrative Cybersecurity Field still Struggling to Hook Prospective Practitioners?

    Only 9% of millennials state they are interested in pursuing cybersecurity as a career at some point in their lives.

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  18. Dixons Carphone Breach & GDPR: What’s Next?

    The first big-name breach post-GDPR has been confirmed, so what can we expect to happen next?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  19. To Inform or Not to Inform, There Should be No Question

    The responsibility of security specialists to both be informed and inform others.

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

  20. The Virtuous Circle between Security Culture and Security Behavior

    When values come into conflict, organizations stand to see all their hard work around security policies come undone.

    1. Photo of Bruce  Hallas

      Bruce Hallas

      Author and Host, Re-thinking the Human Factor (book and podcast)

What’s Hot on Infosecurity Magazine?