Infosecurity Blogs

Best Practices for Securing Your APIs

Best Practices for Securing Your APIs

API breaches are on the rise and are having a dramatic impact on businesses. Organizations should follow four best practice steps to protect APIs

Brought to you by
Citrix

The Next Equifax Attack...That Never Happened

The Next Equifax Attack...That Never Happened

Although a cyber-attack similar to the infamous Equifax breach was thwarted, it shows the urgent need to address digital supply chain security

Brought to you by
Cyberpion

Tailored Administration: A Catalyst for Zero Trust Architecture

Tailored Administration: A Catalyst for Zero Trust Architecture

Zero trust architectures are important, but implementation issues persist. Fortunately, a tailored, custom administration can make it achievable

Brought to you by
OneLogin

The Rise of Initial Access Brokers

The Rise of Initial Access Brokers

How can orgs protect themselves against initial access brokers?

Driving Efficiency with Integrated Management Systems: An OCTO Telematics Case Study

Driving Efficiency with Integrated Management Systems: An OCTO Telematics Case Study

OCTO Telematics CISO, Attilio De Bernardo, explains how his organization uses an integrated management system and certification to improve its security posture

Brought to you by
Lloyd's Register

Linux-based Malware Requires Linux Focused Cybersecurity Strategy

Linux-based Malware Requires Linux Focused Cybersecurity Strategy

Trend Micro's Erin Sindelar considers the Linux-focused cybersecrity strategy needed to tackle an increase in Linux-based malware

Brought to you by
Trend Micro

Creating a Secure Solution Development Lifecycle for Healthcare

Creating a Secure Solution Development Lifecycle for Healthcare

What is SSDLC and can this enhance the security of healthcare organizations?

The Rise of Device Encryption

The Rise of Device Encryption

Company-wide encryption of data is being increasingly recognized as a straightforward way of mitigating the risk of data breach

Brought to you by
Apricorn

Parting Shots From Former Editor, Michael Hill

Parting Shots From Former Editor, Michael Hill

Former Infosecurity Editor, Michael Hill, reflects on his time at Infosecurity Magazine

6 Important Questions About Anomaly Detection

6 Important Questions About Anomaly Detection

Anomaly detection is vital in identifying activity that does not conform to an expected pattern. But what is it?

Smishing: Analyzing Sophisticated Scam Methods

Smishing: Analyzing Sophisticated Scam Methods

The rise of more sophisticated smishing methods has exacerbated the growing threat environment

Hello From Your New Deputy Editor

Hello From Your New Deputy Editor

Our new deputy editor introduces himself and explains why he joined Infosecurity Magazine

Our Bloggers

What’s Hot on Infosecurity Magazine?