Infosecurity Blogs

  1. CRM Communication via Beacons with Security & Privacy in Mind

    Beacon technology is becoming more and more popular within retailers

    1. Photo of Arkadiusz Mlyniec

      Arkadiusz Mlyniec

      Consulting Director CRM & Marketing, Comarch

  2. Successful Digital Transformation Requires Swift, but Informed Action

    Digital transformation is overhauling how enterprises are going about meeting those objectives.

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  3. Why BYOD Authentication Struggles to be Secure

    Given that the general concept in security has always been to eliminate passwords and use MFA, recent survey results are surprising, so why is there a disconnect?

    1. Photo of Aurobindo Sundaram

      Aurobindo Sundaram

      Head of Information Assurance & Data Protection, RELX Group

  4. Pen Testing & Scanning for Vulnerabilities: Differences & Methodologies

    The question of how to protect a business and prevent attacks has never been more important

    1. Photo of Lukasz Czerwonka

      Lukasz Czerwonka

      System Security Engineer, Comarch SA

  5. Security Alert: Worrisome Security Risks Discovered in LG Smart Devices

    Smart vacuum cleaners with sensors and a video camera can be hacked and abused by cyber-criminals

    1. Photo of Ofer Amitai

      Ofer Amitai

      CEO, Portnox

  6. Improving Network Security With Software-Defined Networking

    SDN has shifted the perception of value from hardware to software, and has made it crucial to understand the evolving cyber threat landscape and security challenges around it.

    1. Ewa Wojcik

      Project Manager, Comarch SA

    2. Photo of Malgorzata Zabieglinska–Lupa

      Malgorzata Zabieglinska–Lupa

      ICT Product Manager, Comarch

  7. Huge Changes are Coming: it's Time to Prepare Technologically for GDPR

    Should we expect GDPR to create a major upheaval? Do the upcoming changes hold anything to fear? The answer to both questions is “not necessarily”.

    1. Photo of Dariusz Wójcik

      Dariusz Wójcik

      ICT Product Manager, Comarch

  8. The Top 10 Worst Social Media Cyber-Attacks

    In light of National Cybersecurity Awareness Month, the ZeroFOX team compiled a list of the ten worst social media attacks of all time.

    1. Photo of Spencer Wolfe

      Spencer Wolfe

      Head Security Research Writer at ZeroFOX

  9. Tools Every IT Department Needs to Use

    Despite there now being far greater awareness of cybersecurity threats, the preventative measures that organizations are adopting are largely either insufficient or ineffective.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  10. Cutting the Phishing Line with User Authorization

    Identity theft is still a problem in the 21st century. More and more areas of our lives are being supported by IT. Banking, e-business and education are just some areas in which an individual’s identity is used in virtual and digital reality

    1. Photo of Dariusz Wójcik

      Dariusz Wójcik

      ICT Product Manager, Comarch

  11. User Behavior Analytics Alone is Not Enough for Combatting Insider Threats

    Insider threats come in so many flavors it takes integration and collaboration to prioritize what’s most important.

    1. Photo of Ryan Stolte

      Ryan Stolte

      co-founder and CTO at Bay Dynamics

  12. Is Your Company Ready to Face Tomorrow’s Security Risks?

    Malgorzata Zabieglinska-Lupa speaks to Paulina Świątek and Maciej Rosołek about trends in the security technology market and what companies can do to protect themselves

    1. Maciej Rosołek

      IT Risk & Security Department Manager, Comarch ICT

    2. Paulina Świątek

      Business Solution Manager, Comarch ICT

    3. Photo of Malgorzata Zabieglinska–Lupa

      Malgorzata Zabieglinska–Lupa

      ICT Product Manager, Comarch

  13. 74% of Breaches from Insiders or Outsiders?

    Reports claim that 74% of breaches are down to insiders, or outsiders. Who is correct, and what does the reader learn?

    1. Photo of Kai Roer

      Kai Roer

      Founder and CEO of CLTRe

  14. Was the Equifax CSO to Blame?

    Companies should want well-rounded individuals that can manage people, understand the risks for the company, can communicate with the board, and understand legal ramifications.

    1. Photo of Mari Galloway

      Mari Galloway

      Director of Finance & Communications, Womens Cyberjutsu

  15. Interview: What is the Future of IT Security?

    Malgorzata Zabieglinska-Lupa discusses the most important questions regarding the challenges and latest trends influencing the security industry with Comarch’s Ewelina Kornas-Zarzycka

    1. Photo of Ewelina  Kornaś-Zarzycka

      Ewelina Kornaś-Zarzycka

      Risk and Information Security Specialist, Comarch

    2. Photo of Malgorzata Zabieglinska–Lupa

      Malgorzata Zabieglinska–Lupa

      ICT Product Manager, Comarch

  16. #ISC2Congress: Another Women in Cybersecurity Panel…

    Women in cybersecurity panels aren’t all that rare these days. In fact, I almost skipped the one on the agenda at (ISC)2 Congress in Austin this week because I feel like I’ve been to so many that perhaps I need to take a break.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  17. Securing Modern Assets in the Digital Transformation Age

    One of the biggest challenges of today’s evolving IT landscape is visibility into modern assets.

    1. Photo of Thomas Parsons

      Thomas Parsons

      Senior Director of Product Management, Tenable

  18. How Humans (and Machines) Can Help Fight Phishing

    If we are the weakest link in the cybersecurity infrastructure, shouldn’t we get rid of the human aspect altogether?

    1. Photo of Aaron Higbee

      Aaron Higbee

      CTO, PhishMe

  19. Can MSSPs Help Address the Cyber Workforce Shortage for Healthcare?

    Healthcare organizations that are challenged with finding, onboarding and keeping cyber professionals might want to consider an MSSP

  20. Important Information on New EU Regulations

    Failure to comply with new guidelines will result in significant financial penalties

    1. Agnieszka Niechciałkowska

      Project Manager Comarch ICT

What’s Hot on Infosecurity Magazine?