Infosecurity Blogs

4 Actions to Improve DDoS Protection

4 Actions to Improve DDoS Protection

Basic steps you can take to improve your protection – without requiring any professional help

Brought to you by
Red Button

What Do Secure Email Gateways and Olympic Judges Have in Common?

What Do Secure Email Gateways and Olympic Judges Have in Common?

Why removing as much subjectivity as possible will lead to more confident outcomes and a clearer path to gold

Brought to you by
Cofense

Ransomware: A Constant Threat

Ransomware: A Constant Threat

How firms can eliminate much of the risk of falling victim to a ransomware attack

Brought to you by
LRQA

Three A's to Look For When Considering a SAST Tool

Three A's to Look For When Considering a SAST Tool

Three ways to lay a solid foundation to support an effective, accurate and holistic security program

Brought to you by
GitGuardian

The Exploitation of Cloud Services Continues in 2022

The Exploitation of Cloud Services Continues in 2022

With cyber-criminals using increasingly sophisticated attack methods, organizations must evolve their security strategies

Securing the UK's Operators of Essential Services Against Cyber-Attacks

Securing the UK's Operators of Essential Services Against Cyber-Attacks

Why preparedness is one of the most important elements for an effective response

Brought to you by
Dragos

Greater IT Connection Means Greater Ransomware Risk on the Mainframe

Greater IT Connection Means Greater Ransomware Risk on the Mainframe

Now is the time to recognize the risks the mainframe poses and take steps to avoid a potential disaster

Brought to you by
KRI Security

Disruption 3.0 But Scams 1.0

Disruption 3.0 But Scams 1.0

Javvad Malik discusses the security challenges posed by the growth of Web 3.0

Five Tough Questions CEOs Should Be Asking Their CISOs

Five Tough Questions CEOs Should Be Asking Their CISOs

The time to ask these tough questions is before incidents occur, not in after-action reviews

Brought to you by
Cymulate

Cybersecurity Compliance Still Not a Priority for Companies, IBM Survey Shows

Cybersecurity Compliance Still Not a Priority for Companies, IBM Survey Shows

Why cybersecurity compliance remains a driving force underlying business success

Brought to you by
TechDLP

A Ransomware Outlook for 2022

A Ransomware Outlook for 2022

The past two years have seen ransomware attacks become both more sophisticated and bolder; what trends are expected for 2022?

The Vulnerability of the UK's 'Just in Time' Supply Chain

The Vulnerability of the UK's 'Just in Time' Supply Chain

Why the resilience of the UK’s supply chain against cybercrime can be significantly improved

Brought to you by
Dragos

Our Bloggers

What’s Hot on Infosecurity Magazine?