Infosecurity Blogs

  1. Using Marketing Strategies to Influence Security Behaviour

    When it comes to influencing security behavior, it’s helpful to first look at effective marketing strategies.

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  2. GDPR Questions Answered: Is My Blog Compliant?

    Is my blog compliant with GDPR? Jon Baines from NADPO answers your questions.

    1. Photo of Jon Baines

      Jon Baines

      Data Protection Advisor at Mishcon de Reya LLP, and Chair of NADPO

  3. Don't WannaCry Again? Here's How to Prevent it

    A year since WannaCry, how much has security learned about applying the basics?

    1. Photo of Alex Manea

      Alex Manea

      CSO, BlackBerry

  4. GDPR Questions Answered: Do We Need Consent to Hold Information in a Database?

    Does a database of available information comply with GDPR? Jon Baines from NADPO answers your questions.

    1. Photo of Jon Baines

      Jon Baines

      Data Protection Advisor at Mishcon de Reya LLP, and Chair of NADPO

  5. Mumbo-Jumbo Conquered the World and Created Confusion around Security Analytics

    How poor explanations and bad scientific method have twisted belief and understanding in both science and security analytics

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

  6. State of Cybersecurity 2018: Enterprises Can Do Better

    Are things in cybersecurity better or worse than they were 12 months ago?

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  7. Dispelling the FUD: Key insights from the "#GDPR for Dummies" Roadshow

    Metacompliance offers advice collected from common questions on its GDPR for Dummies" Roadshow.

    1. Photo of Shane Fuller

      Shane Fuller

      Lead Privacy Advisor at MetaCompliance, Co-Author of the official ‘GDPR for Dummies’

  8. Data Breach Notifications and Why Honesty is the Best Policy

    In the case of a data breach, it's in a business’s best interest to be as honest with customers as possible.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  9. Securing Your Organization's Human Layer

    There is value in adopting a cybersecurity framework because of the structured manner of thinking that it helps impose.

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  10. Securing Critical Infrastructure in the Wake of Unprecedented Cyber Threats

    New legislation is due this month to help make nations more resilient in the face of disruptive malware.

    1. Photo of Gavin Millard

      Gavin Millard

      Vice President, Products, Tenable

  11. How to Cure the Healthcare System's 'Cyberflu'

    How vulnerable is the healthcare industry to cyber-attack, and who needs to take the lead to improve its posture?

    1. Photo of Aviv  Grafi

      Aviv Grafi

      CEO of Votiro

  12. Treat Security Data With the Same Purpose as Financial Data

    There’s a comparable amount of security data as there is financial data flowing through a financial organization.

    1. Photo of Liz Maida

      Liz Maida

      Founder, CEO and CTO of Uplevel Security

  13. Why Healthcare Cannot Afford to Rely on Two-Factor Authentication

    On its own, 2FA will protect you some of the time but not all the time.

    1. Photo of Keith Graham

      Keith Graham

      Chief Technology Officer at SecureAuth and Core Security

  14. The Cost of Sharing Our Data Online

    A personality app harvested your data and Facebook and Cambridge Analytica faced government scrutiny, but we knew this was coming.

    1. Photo of Simon McCalla

      Simon McCalla

      CTO, Nominet

  15. Compliance and Your Data Center

    Compliance standards aren't only in place to make your life difficult, they exist for the good of your business.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  16. Understand the Inherent Risk in Browser Extensions

    A look at vulnerabilities in browser application stores that contain well-intentioned, yet vulnerable, extensions, as well as purposefully developed malware.

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  17. Supporting a Back-to-Basics Approach with Cyber Threat Intelligence

    Threat intelligence can be an invaluable early warning system in helping to identify and block potential threats before they escalate and become problems.

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  18. GDPR Questions Answered: Where do I Learn to be a DPO?

    How to learn and train to be a data protection officer, and how your organization matters.

    1. Photo of Steve Wright

      Steve Wright

      Group Data Privacy Officer

  19. We Must Attract Women into Cybersecurity to Close the Skills Gap #IWD2018

    By leveraging the increasing interest among women in technology today and inspiring teenagers and young girls into the sector through education, industry leaders could dramatically reduce the workforce deficit.

    1. Photo of Michelle Johnson Cobb

      Michelle Johnson Cobb

      Chief Marketing Officer, Skybox Security

  20. Is This The Year of Reckoning for the CISO - Part Two

    Why businesses must play their part in supporting and elevating the CISO role.

    1. Photo of Stephen Moore

      Stephen Moore

      Chief Security Strategist, Exabeam

What’s Hot on Infosecurity Magazine?