Infosecurity Blogs

  1. User and Entity Behavior Analytics is Just One Piece of the Insider Threat Puzzle

    User and entity behavior analytics (UEBA) has quickly become a crowded space. CISOs are overwhelmed by vendors promising UEBA as the key to combatting insider threats when in reality it’s “a” key not “the” key.

    1. Photo of Feris Rifai

      Feris Rifai

      CEO and Co-Founder of Bay Dynamics

  2. Your Money or Your Data? Mitigating Ransomware with Dropbox

    Ransomware is designed to scare you into parting with money to avoid losing your data; there is no reason that either should happen. Traditional anti-virus and cloud storage services such as Dropbox form part of an effective mitigation strategy.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  3. What Apple Vs. The FBI Can Teach Us About Cloud Storage Security

    The recent Apple vs. FBI debate hit close to home for the cloud community because it touched on one of the industry’s hottest topics: data security.

    1. Photo of John Taylor

      John Taylor

      Chief Technology Officer, Panzura

  4. Five Ways to Improve Security and Increase Collaboration

    With mass migration from business in brick-and-mortar to the ‘wild’ World Wide Web, there are bound to be some growing pains.

    1. Photo of Dave Lenoe

      Dave Lenoe

      Director of Secure Software Engineering at Adobe

  5. $100 Million Bank Heist Brought to Light by “Fandation”

    Financial institutions in the Middle East are deeply concerned about their cyber-presence, as cyber-attacks have escalated over a period of very short time.

    1. Photo of Muhammad Suleman

      Muhammad Suleman

      Senior Information Security Consultant

  6. Why Healthcare must Adapt Information Security to Mobile

    In 1996, the Health Insurance Portability and Accountability Act, or HIPAA, was enacted in order to combat the rise in healthcare-related security attacks - studies uncovered that 80% of executives at healthcare providers and insurers have been hit by a cyber-attack, while the healthcare industry in general is 200% more likely to suffer from an attack than other sectors.

    1. Photo of Omri Sigelman

      Omri Sigelman

      Co-founder and CMO of Nuro Secure Messaging

  7. Guess Who's Accessing Your Network?

    The relentless news of security breaches is merely proof that organizations are fighting a constant battle to keep their data safe from phishing, hacks and identity theft.

    1. Photo of Darren Gross

      Darren Gross

      Director EMEA

  8. The Dark Web – Is it All Bad?

    The internet as we know it today cannot easily be split into 'right and wrong' with history showing us just as many bad things happen on the standard net as on the Dark Web

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  9. Akamai takes on Distil Networks in bot control

    Bad bots are used for all sorts of activities including brute force login attempts, online ad fraud (creating false clicks), co-ordinating man-in-the-middle attacks, scanning for IT vulnerabilities that attackers can exploit and clustered as bot-nets to perpetrate denial of service attacks.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  10. How to Deal with the Blind Spots in Your Security Created by Encrypted Traffic

    The top five most common network traffic inspection errors made today.

    1. Photo of Robert Arandjelovic

      Robert Arandjelovic

      Director of Product Marketing, Americas, Symantec

  11. My First Eight Weeks in Infosecurity

    As I approach the end of my second month as the Deputy Editor at Infosecurity Magazine, I feel now is a good time to take a short breather and reflect on what the last several weeks have taught me about an industry that, two months ago, I knew very little about.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  12. The Skills Gap, it's Cause and How to Close It

    A look at how the current skills gap is affecting the cybersecurity industry, why it exists and how to turn things around

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. The Three “M”s of a Successful Career in Information Security

    These “Three Ms of Success”, when implemented, will ensure success for your career in information security.

    1. Photo of David Cass

      David Cass

      CISO - IBM Cloud SaaS Operational Services, IBM MaaS360

  14. Transatlantic Data Security

    Trade agreements between the US and EU may level the playing field for the many businesses that trade on both sides of the Atlantic, but the EU will still have different rules regarding data protection

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  15. Bug Bounties - The Resolution to Software Flaws

    "We get more bug reports, which means we get more bug fixes, which means a better experience for our users."

  16. The Danger of Free SSL Certificates

    When Amazon ACM issues certificates, the corresponding private keys are stored in the cloud.

    1. Photo of Nick Hunter

      Nick Hunter

      Senior Technical Manager, Venafi

  17. Cybercrime 'Suspects': Who Are Companies Up Against?

    In ‘The Unusual Suspects’ Dr Adrian Nish discusses the six specific cybercriminal ‘suspects’ that companies are facing.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. Support Scammers Targeting Dell Customers

    If Dell customer data is in the hands of support scammers, irrespective of how it was acquired, perhaps it's time for Dell to be more proactive in warning its customers?

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  19. Cyber Security in the Middle East

    Pakistan and the UAE is stepping up efforts to defend against cyber-crime

    1. Photo of Muhammad Suleman

      Muhammad Suleman

      Senior Information Security Consultant

  20. A Big Year Ahead for IoT

    New study reveals businesses have big plans for IoT in 2016, but highlights concerns over the security risks that come with it

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s Hot on Infosecurity Magazine?