Infosecurity Blogs

  1. User Behavior Analytics Alone is Not Enough for Combatting Insider Threats

    Insider threats come in so many flavors it takes integration and collaboration to prioritize what’s most important.

    1. Photo of Ryan Stolte

      Ryan Stolte

      co-founder and CTO at Bay Dynamics

  2. Is Your Company Ready to Face Tomorrow’s Security Risks?

    Malgorzata Zabieglinska-Lupa speaks to Paulina Świątek and Maciej Rosołek about trends in the security technology market and what companies can do to protect themselves

    1. Maciej Rosołek

      IT Risk & Security Department Manager, Comarch ICT

    2. Paulina Świątek

      Business Solution Manager, Comarch ICT

    3. Photo of Malgorzata Zabieglinska–Lupa

      Malgorzata Zabieglinska–Lupa

      ICT Product Manager, Comarch

  3. 74% of Breaches from Insiders or Outsiders?

    Reports claim that 74% of breaches are down to insiders, or outsiders. Who is correct, and what does the reader learn?

    1. Photo of Kai Roer

      Kai Roer

      Founder and CEO of CLTRe

  4. Was the Equifax CSO to Blame?

    Companies should want well-rounded individuals that can manage people, understand the risks for the company, can communicate with the board, and understand legal ramifications.

    1. Photo of Mari Galloway

      Mari Galloway

      Director of Finance & Communications, Womens Cyberjutsu

  5. Interview: What is the Future of IT Security?

    Malgorzata Zabieglinska-Lupa discusses the most important questions regarding the challenges and latest trends influencing the security industry with Comarch’s Ewelina Kornas-Zarzycka

    1. Photo of Ewelina  Kornaś-Zarzycka

      Ewelina Kornaś-Zarzycka

      Risk and Information Security Specialist, Comarch

    2. Photo of Malgorzata Zabieglinska–Lupa

      Malgorzata Zabieglinska–Lupa

      ICT Product Manager, Comarch

  6. #ISC2Congress: Another Women in Cybersecurity Panel…

    Women in cybersecurity panels aren’t all that rare these days. In fact, I almost skipped the one on the agenda at (ISC)2 Congress in Austin this week because I feel like I’ve been to so many that perhaps I need to take a break.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  7. Securing Modern Assets in the Digital Transformation Age

    One of the biggest challenges of today’s evolving IT landscape is visibility into modern assets.

    1. Photo of Thomas Parsons

      Thomas Parsons

      Senior Director of Product Management, Tenable

  8. How Humans (and Machines) Can Help Fight Phishing

    If we are the weakest link in the cybersecurity infrastructure, shouldn’t we get rid of the human aspect altogether?

    1. Photo of Aaron Higbee

      Aaron Higbee

      CTO, PhishMe

  9. Can MSSPs Help Address the Cyber Workforce Shortage for Healthcare?

    Healthcare organizations that are challenged with finding, onboarding and keeping cyber professionals might want to consider an MSSP

  10. Important Information on New EU Regulations

    Failure to comply with new guidelines will result in significant financial penalties

    1. Agnieszka Niechciałkowska

      Project Manager Comarch ICT

  11. Why The Equifax Hack Doesn't Matter!

    The Equifax breach doesn’t matter as your data was already out there!

    1. Chris Moschovitis

      CEO of tmg-emedia

  12. In-House or Cloud? Where is More Secure?

    There is a ‘most appropriate’ model that depends on the unique requirements of your business, the size of your company and your budget

    1. Photo of Marcin  Geroch

      Marcin Geroch

      ICT Consulting Director

    2. Photo of Malgorzata Zabieglinska–Lupa

      Malgorzata Zabieglinska–Lupa

      ICT Product Manager, Comarch

  13. Back to School 101: Cyber Hygiene For Students

    Does your family's back-to-school checklist include a cyber hygiene check-up? If not, here are a few quick tips.

  14. Defray Attacks Highlight Trends in Ransomware Campaigns

    Defray is a customized ransomware program that encrypts all files contained on a victim’s hard drive upon download and execution.

    1. Photo of Samuel Siskind

      Samuel Siskind

      Security Analyst

  15. Security: Trends of Threats in 2017

    Websites dealing with security issues are more and more frequently reporting new threats in the IT field

    1. Photo of Dariusz Wójcik

      Dariusz Wójcik

      ICT Product Manager, Comarch

  16. Destination Boston! The Journey so Far

    One of the things that has struck me during the conversations I’ve had in the run up to the event has been the collaborative and vibrant nature of the East Coast infosec community.

    1. Photo of Victoria Windsor

      Victoria Windsor

      Moderator, Infosecurity Magazine

  17. Securing Hybrid IT: Considerations When Moving To a Mixed Ownership Model

    Moving from traditional on-premise data storage to a hybrid IT environment means that internet-based cloud services are now involved.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  18. The Role of CISO in the Face of the GDPR

    GDPR will create a lot of work in a short time, and the CISO will need help from the whole corporation.

  19. Security: A High-Stake Soccer Match

    If we delve into IT security, we discover it has more in common with soccer than would have been initially expected

    1. Ewelina Kornas–Zarzycka

      Information Security Specialist, Comarch

    2. Photo of Malgorzata Zabieglinska–Lupa

      Malgorzata Zabieglinska–Lupa

      ICT Product Manager, Comarch

  20. For Phishing Protection, Rely on More than Users

    If we are “down to people” to protect against phishing and ransomware, as is claimed by many security professionals in addition to Wombat, we should just give up the fight.

    1. Photo of Kai Roer

      Kai Roer

      Founder and CEO of CLTRe

What’s Hot on Infosecurity Magazine?