Infosecurity Blogs

  1. The Domain Name and its Role in Cyber Forensics

    It remains very easy for anyone to inexpensively buy a domain name, obtain an IP address and set up a host server.

    1. Photo of Tim Helming

      Tim Helming

      Director of Product Management, DomainTools

  2. The Security Challenges of Enterprise Container Adoption

    The blending of development and operations processes into DevOps has also changed the way software is deployed.

    1. Photo of Anthony Bettini

      Anthony Bettini

      Senior Director of Software Engineering, Tenable

  3. Your 2017 Data Centre Security Checklist

    There is big money to be made extorting an organization’s data center—or “brain”.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  4. #WCSC17: A Day at World Cybersecurity Congress 2017

    This week Islington’s Business Design Centre played host to the World Cybersecurity Congress 2017, with a schedule packed full of interesting sessions and discussions from speakers from a variety of different sectors and specialties

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. GDPR Compliance: Time to Face Mission Impossible?

    The subject of GDPR compliance continues to be on the lips of many in the information security industry, and rightly so as the regulation promises to revolutionize the way we work and store data

  6. The Rise of the Threat Hunter

    Being proactive, sniffing out threats, and improving detection and response times is vital in the ongoing fight against cyber-attacks. A mix of prevention and response is the ideal strategy.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  7. #SecuriTay 2017 & the Future of An Industry

    Held in Dundee’s Abertay University, and now in its sixth year, SecuriTay is organized by the Ethical Hacking Society and “aimed at anyone with an interest in hacking and information security”

  8. #RSAC: Wendy Nather: Why AV Should Never Have Been Invented and Why We've Brought the Skills Gap on Ourselves

    Wendy Nather talks AV, skills gap, CISO decisions and why passwords should be written down

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  9. Digesting the Diversity of Data Breaches

    The diverse nature of cyber-threats can make one quite unique from another, affecting every department within an organization and no longer confined to the IT department

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. Eagles Take the #Superbowl of Passwords

    Based on the release of ten million passwords, the data crunching revealed that the most popular gridiron team for a password was the Philadelphia Eagles, followed by the Dallas Cowboys, Pittsburgh Steelers and Oakland Raiders

  11. Come Fly with Me: Securing the Drone

    New report seeks to aid the safe and secure creation and operation of unmanned aircraft systems

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  12. Ultrasonic Cross-Device Tracking

    The Risk Avengers take a look at the issue of ultrasonic cross-device tracking

    1. Photo of The  Risk Avengers

      The Risk Avengers

      Information Security Consultancy

  13. (ISC)2 - Top Trends to Watch in 2017

    As we enter 2017, this will be the year in which the potential cracks in the pillars of the knowledge economy start to show.

    1. Photo of Adrian Davis

      Adrian Davis

      Consulting COO & CIO

  14. RIG EK Dropping TrickBot Trojan & Madness/Quant Loader DoS Bot

    As the exploit market begins to diversify, it has seen the introduction of new threats, the most recent being the inclusion of a relative new comer in TrickLoader and an older threat known as TrickBot

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  15. DaaS, VDI, and the Changing World of the Desktop

    This brave new world has even seen significant changes in the way that desktops are delivered, with DaaS (desktop as a service) and VDI (virtual-desktop infrastructure) becoming a more pressing need for modern business.

    1. Photo of Mav Turner

      Mav Turner

      Director, IT Security Business, SolarWinds

  16. On the 12th Day of Christmas, the Industry Predicted…a Skills Gap Challenge

    Experts have their say on what they expect the cybersecurity skills scene to be like in 2017

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  17. On the 11th Day of Christmas, the Industry Predicted…Better Security Collaboration

    2017 could be the year we see collaborative security come into fruition like never before

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. On the Tenth Day of Christmas, the Industry Predicted…Cloud Vendor Compromise

    Experts predict that a major cloud vendor will be in the news for suffering a significant security breach

  19. Deck the Halls With...Cybersecurity Awareness

    The Risk Avengers have written a Christmas song especially for the Infosecurity Magazine readers.

    1. Photo of The  Risk Avengers

      The Risk Avengers

      Information Security Consultancy

  20. On the Ninth Day of Christmas, the Industry Predicted…GDPR Compliance

    Of course this is a 2017 prediction and I’m well aware that the General Data Protection Regulation (GDPR) does not come into force until 25th May 2018, but with 526 days to go, 2017 is the final full calendar year to achieve compliance and predictions seen by Infosecurity show that it is a case of now or never for your preparations

What’s Hot on Infosecurity Magazine?