Infosecurity Blogs

Pen Testing & Scanning for Vulnerabilities: Differences & Methodologies
The question of how to protect a business and prevent attacks has never been more important

Security Alert: Worrisome Security Risks Discovered in LG Smart Devices
Smart vacuum cleaners with sensors and a video camera can be hacked and abused by cyber-criminals

Improving Network Security With Software-Defined Networking
SDN has shifted the perception of value from hardware to software, and has made it crucial to understand the evolving cyber threat landscape and security challenges around it.

Huge Changes are Coming: it's Time to Prepare Technologically for GDPR
Should we expect GDPR to create a major upheaval? Do the upcoming changes hold anything to fear? The answer to both questions is “not necessarily”.

The Top 10 Worst Social Media Cyber-Attacks
In light of National Cybersecurity Awareness Month, the ZeroFOX team compiled a list of the ten worst social media attacks of all time.

Tools Every IT Department Needs to Use
Despite there now being far greater awareness of cybersecurity threats, the preventative measures that organizations are adopting are largely either insufficient or ineffective.

Cutting the Phishing Line with User Authorization
Identity theft is still a problem in the 21st century. More and more areas of our lives are being supported by IT. Banking, e-business and education are just some areas in which an individual’s identity is used in virtual and digital reality

User Behavior Analytics Alone is Not Enough for Combatting Insider Threats
Insider threats come in so many flavors it takes integration and collaboration to prioritize what’s most important.

Is Your Company Ready to Face Tomorrow’s Security Risks?
Malgorzata Zabieglinska-Lupa speaks to Paulina Świątek and Maciej Rosołek about trends in the security technology market and what companies can do to protect themselves

74% of Breaches from Insiders or Outsiders?
Reports claim that 74% of breaches are down to insiders, or outsiders. Who is correct, and what does the reader learn?

Was the Equifax CSO to Blame?
Companies should want well-rounded individuals that can manage people, understand the risks for the company, can communicate with the board, and understand legal ramifications.

Interview: What is the Future of IT Security?
Malgorzata Zabieglinska-Lupa discusses the most important questions regarding the challenges and latest trends influencing the security industry with Comarch’s Ewelina Kornas-Zarzycka

#ISC2Congress: Another Women in Cybersecurity Panel…
Women in cybersecurity panels aren’t all that rare these days. In fact, I almost skipped the one on the agenda at (ISC)2 Congress in Austin this week because I feel like I’ve been to so many that perhaps I need to take a break.

Securing Modern Assets in the Digital Transformation Age
One of the biggest challenges of today’s evolving IT landscape is visibility into modern assets.

How Humans (and Machines) Can Help Fight Phishing
If we are the weakest link in the cybersecurity infrastructure, shouldn’t we get rid of the human aspect altogether?

Can MSSPs Help Address the Cyber Workforce Shortage for Healthcare?
Healthcare organizations that are challenged with finding, onboarding and keeping cyber professionals might want to consider an MSSP

Important Information on New EU Regulations
Failure to comply with new guidelines will result in significant financial penalties

Why The Equifax Hack Doesn't Matter!
The Equifax breach doesn’t matter as your data was already out there!

In-House or Cloud? Where is More Secure?
There is a ‘most appropriate’ model that depends on the unique requirements of your business, the size of your company and your budget

Back to School 101: Cyber Hygiene For Students
Does your family's back-to-school checklist include a cyber hygiene check-up? If not, here are a few quick tips.


















