Infosecurity Blogs

Why The Equifax Hack Doesn't Matter!

Why The Equifax Hack Doesn't Matter!

The Equifax breach doesn’t matter as your data was already out there!

In-House or Cloud? Where is More Secure?

In-House or Cloud? Where is More Secure?

There is a ‘most appropriate’ model that depends on the unique requirements of your business, the size of your company and your budget

Brought to you by
Comarch

Back to School 101: Cyber Hygiene For Students

Back to School 101: Cyber Hygiene For Students

Does your family's back-to-school checklist include a cyber hygiene check-up? If not, here are a few quick tips.

Defray Attacks Highlight Trends in Ransomware Campaigns

Defray Attacks Highlight Trends in Ransomware Campaigns

Defray is a customized ransomware program that encrypts all files contained on a victim’s hard drive upon download and execution.

Security: Trends of Threats in 2017

Security: Trends of Threats in 2017

Websites dealing with security issues are more and more frequently reporting new threats in the IT field

Brought to you by
Comarch

Destination Boston! The Journey so Far

Destination Boston! The Journey so Far

One of the things that has struck me during the conversations I’ve had in the run up to the event has been the collaborative and vibrant nature of the East Coast infosec community.

Securing Hybrid IT: Considerations When Moving To a Mixed Ownership Model

Securing Hybrid IT: Considerations When Moving To a Mixed Ownership Model

Moving from traditional on-premise data storage to a hybrid IT environment means that internet-based cloud services are now involved.

The Role of CISO in the Face of the GDPR

The Role of CISO in the Face of the GDPR

GDPR will create a lot of work in a short time, and the CISO will need help from the whole corporation.

Security: A High-Stake Soccer Match

Security: A High-Stake Soccer Match

If we delve into IT security, we discover it has more in common with soccer than would have been initially expected

Brought to you by
Comarch

For Phishing Protection, Rely on More than Users

For Phishing Protection, Rely on More than Users

If we are “down to people” to protect against phishing and ransomware, as is claimed by many security professionals in addition to Wombat, we should just give up the fight.

CISO and CIO Strategic and Together, or Nothing

CISO and CIO Strategic and Together, or Nothing

In a simplified holistic view, what we saw and continue to see today is an exponential movement of technology adoption

Adopting Performance Data into Your Security Strategy

Adopting Performance Data into Your Security Strategy

It is essential that data centres use standard performance metrics as the basis of a comprehensive security policy and process.

Our Bloggers

What’s Hot on Infosecurity Magazine?