Infosecurity Blogs

  1. Akamai takes on Distil Networks in bot control

    Bad bots are used for all sorts of activities including brute force login attempts, online ad fraud (creating false clicks), co-ordinating man-in-the-middle attacks, scanning for IT vulnerabilities that attackers can exploit and clustered as bot-nets to perpetrate denial of service attacks.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  2. How to Deal with the Blind Spots in Your Security Created by Encrypted Traffic

    The top five most common network traffic inspection errors made today.

    1. Photo of Robert Arandjelovic

      Robert Arandjelovic

      Director of Product Marketing, Americas, Symantec

  3. My First Eight Weeks in Infosecurity

    As I approach the end of my second month as the Deputy Editor at Infosecurity Magazine, I feel now is a good time to take a short breather and reflect on what the last several weeks have taught me about an industry that, two months ago, I knew very little about.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  4. The Skills Gap, it's Cause and How to Close It

    A look at how the current skills gap is affecting the cybersecurity industry, why it exists and how to turn things around

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. The Three “M”s of a Successful Career in Information Security

    These “Three Ms of Success”, when implemented, will ensure success for your career in information security.

    1. Photo of David Cass

      David Cass

      CISO - IBM Cloud SaaS Operational Services, IBM MaaS360

  6. Transatlantic Data Security

    Trade agreements between the US and EU may level the playing field for the many businesses that trade on both sides of the Atlantic, but the EU will still have different rules regarding data protection

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  7. Bug Bounties - The Resolution to Software Flaws

    "We get more bug reports, which means we get more bug fixes, which means a better experience for our users."

  8. The Danger of Free SSL Certificates

    When Amazon ACM issues certificates, the corresponding private keys are stored in the cloud.

    1. Photo of Nick Hunter

      Nick Hunter

      Senior Technical Manager, Venafi

  9. Cybercrime 'Suspects': Who Are Companies Up Against?

    In ‘The Unusual Suspects’ Dr Adrian Nish discusses the six specific cybercriminal ‘suspects’ that companies are facing.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. Support Scammers Targeting Dell Customers

    If Dell customer data is in the hands of support scammers, irrespective of how it was acquired, perhaps it's time for Dell to be more proactive in warning its customers?

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  11. Cyber Security in the Middle East

    Pakistan and the UAE is stepping up efforts to defend against cyber-crime

    1. Photo of Muhammad Suleman

      Muhammad Suleman

      Senior Information Security Consultant

  12. A Big Year Ahead for IoT

    New study reveals businesses have big plans for IoT in 2016, but highlights concerns over the security risks that come with it

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. Love Is in the Air, and So Are Security Threats

    It may be the most romantic day of the year but that hasn’t lessened any of the security risks for online shoppers and dating app users.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  14. The ‘Human’ Side of Cybersecurity

    Arm your people with security knowledge, and you'll see the benefits.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  15. Cyber Security Training and Certifications have Expanded Rapidly, Where Should you Focus?

    Cybersecurity training courses and certifications have exploded in popularity over the last five years.

  16. Error 53 is “for your own good" says Apple. Experts disagree

    The issue is being called the "Error 53" problem, and so far there's no fix.

    1. Photo of Steve Lord

      Steve Lord

      Co-founder of 44CON and technical director of Mandalorian

  17. What Motivates Cyber-criminals and Who Are They Targeting?

    A peek into the world of cyber-criminals, what motivates them and who they are targeting.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. Fear of the Unknown – How to Survive

    While the average employee might not understand something as sophisticated as software defined networking, they likely understand the function of the network and have a general understanding of the cloud.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  19. Five Cybersecurity Questions Every Executive Should Ask

    Executives should regularly ask five questions of those responsible for cybersecurity concerning the level of cyber-risk their organization is carrying.

    1. Photo of Rob Sloan

      Rob Sloan

      Head of Cyber Content and Data, Dow Jones Risk and Compliance

  20. The Rise and Rise of Public Cloud Services

    Cloud enthusiastic digital natives are now gaining business management positions, whilst shadow IT is becoming an accepted norm. The choice IT departments face is no longer whether or not to adopt cloud-based services, but about the security that is put in place to support their use.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

What’s Hot on Infosecurity Magazine?