Infosecurity Blogs

  1. Why The Equifax Hack Doesn't Matter!

    The Equifax breach doesn’t matter as your data was already out there!

    1. Chris Moschovitis

      CEO of tmg-emedia

  2. In-House or Cloud? Where is More Secure?

    There is a ‘most appropriate’ model that depends on the unique requirements of your business, the size of your company and your budget

    1. Photo of Marcin  Geroch

      Marcin Geroch

      ICT Consulting Director

    2. Photo of Malgorzata Zabieglinska–Lupa

      Malgorzata Zabieglinska–Lupa

      ICT Product Manager, Comarch

  3. Back to School 101: Cyber Hygiene For Students

    Does your family's back-to-school checklist include a cyber hygiene check-up? If not, here are a few quick tips.

  4. Defray Attacks Highlight Trends in Ransomware Campaigns

    Defray is a customized ransomware program that encrypts all files contained on a victim’s hard drive upon download and execution.

    1. Photo of Samuel Siskind

      Samuel Siskind

      Security Analyst

  5. Security: Trends of Threats in 2017

    Websites dealing with security issues are more and more frequently reporting new threats in the IT field

    1. Photo of Dariusz Wójcik

      Dariusz Wójcik

      ICT Product Manager, Comarch

  6. Destination Boston! The Journey so Far

    One of the things that has struck me during the conversations I’ve had in the run up to the event has been the collaborative and vibrant nature of the East Coast infosec community.

    1. Photo of Victoria Windsor

      Victoria Windsor

      Moderator, Infosecurity Magazine

  7. Securing Hybrid IT: Considerations When Moving To a Mixed Ownership Model

    Moving from traditional on-premise data storage to a hybrid IT environment means that internet-based cloud services are now involved.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  8. The Role of CISO in the Face of the GDPR

    GDPR will create a lot of work in a short time, and the CISO will need help from the whole corporation.

  9. Security: A High-Stake Soccer Match

    If we delve into IT security, we discover it has more in common with soccer than would have been initially expected

    1. Ewelina Kornas–Zarzycka

      Information Security Specialist, Comarch

    2. Photo of Malgorzata Zabieglinska–Lupa

      Malgorzata Zabieglinska–Lupa

      ICT Product Manager, Comarch

  10. For Phishing Protection, Rely on More than Users

    If we are “down to people” to protect against phishing and ransomware, as is claimed by many security professionals in addition to Wombat, we should just give up the fight.

    1. Photo of Kai Roer

      Kai Roer

      Founder and CEO of CLTRe

  11. CISO and CIO Strategic and Together, or Nothing

    In a simplified holistic view, what we saw and continue to see today is an exponential movement of technology adoption

  12. Adopting Performance Data into Your Security Strategy

    It is essential that data centres use standard performance metrics as the basis of a comprehensive security policy and process.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  13. A Culture of Security, Not of Blame

    Technology continuously introduces huge amounts of security challenges and risk factors, which we keep blaming employees for not handling correctly. Blaming people for not handling poor technology correctly is - in my opinion - simply wrong.

    1. Photo of Kai Roer

      Kai Roer

      Founder and CEO of CLTRe

  14. Why You Need Private Browsing

    If you thought browsing securely (and privately) was as easy as opening a new incognito window, think again.

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  15. EU GDPR Final Countdown: How to Prepare Your Security Program

    GDPR will have real-world impact, and not just for EU member states.

    1. Photo of Gavin Millard

      Gavin Millard

      Vice President, Products, Tenable

  16. Is DDoS Protection Right For You?

    What should a company do about DDoS? They should follow a risk-based methodology to judge cost and weigh it against benefits and ways to address the risk.

    1. Photo of Aurobindo Sundaram

      Aurobindo Sundaram

      Head of Information Assurance & Data Protection, RELX Group

  17. Key Details on the Australian Meta-Data Retention Law

    As Australia's newly approved Data Retention law comes into effect, how does it actually affect the average internet user?

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  18. How To Sell Endpoint Security to Business Leaders

    Engaging with C-suite execs, security pros can more effectively explain and advocate the need to invest while leading the business toward a safer future.

    1. Photo of Christoph Ruef

      Christoph Ruef

      Vice president and general manager, printing business., HP

  19. Why Bill 34 is Bad News for Internet Privacy

    The S.J.Res. 34 bill has effectively destroyed the privacy of internet users in the US and has taken the world by storm.

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  20. The 'Dark RAT'

    In March 2017, Fujitsu Cyber Threat Intelligence uncovered a newly developed remote access tool referred to by its developer as ‘Dark RAT'

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

What’s Hot on Infosecurity Magazine?