Infosecurity Blogs

Behind the Scenes & in Front of the Attack: The Largest DDoS Attack on Record

Behind the Scenes & in Front of the Attack: The Largest DDoS Attack on Record

An attack large enough to take many countries offline, yet it was over before it ever got a chance to do harm

Brought to you by
Akamai

The Rise of Account Takeover Fraud in the Media Industry

The Rise of Account Takeover Fraud in the Media Industry

A robust criminal ecosystem is acting as a parasite on the wave of content shifting to OTT delivery models

On-Prem WAFs: Lacking the Scale & Flexibility to Thwart Today’s Threats

On-Prem WAFs: Lacking the Scale & Flexibility to Thwart Today’s Threats

A cloud-based security solution that is deployed at the edge of the network is in greater demand, and driving the market

Brought to you by
Akamai

Security: a Missing Ingredient in Many DevOps Implementations

Security: a Missing Ingredient in Many DevOps Implementations

The most successful organizations of the future will make DevSecOps a cornerstone of their business operations

The Security Landscape is Constantly Evolving: Are You Ready?

The Security Landscape is Constantly Evolving: Are You Ready?

The one certainty in the world of cybersecurity is that change is imminent

Brought to you by
Akamai

Micro-Segmentation: A Solid Security Requirement in a Turbulent Environment

Micro-Segmentation: A Solid Security Requirement in a Turbulent Environment

The need for micro-segmentation as a security solution is not new

Brought to you by
Guardicore

Incident Response: Endgame

Incident Response: Endgame

What incident response lessons can we learn from the latest Marvel episode?

Understanding ICO Password Recommendations

Understanding ICO Password Recommendations

Passwords may be a small part of GDPR requirements, but they also represent the easiest way to gain unauthorized access to personally identifiable data

Brought to you by
Specops

Perspective Changes Everything: Shift Your Focus to the Edge

Perspective Changes Everything: Shift Your Focus to the Edge

There was a time when you could build a virtual wall and protect anything inside a data center – but times have changed

Brought to you by
Akamai

Survival of the Fittest: Take Security to the Edge

Survival of the Fittest: Take Security to the Edge

Deploying security at the edge allows you to keep pace with a complex and constantly changing digital ecosystem

Brought to you by
Akamai

Password Requirements from NCSC & Cyber Essentials

Password Requirements from NCSC & Cyber Essentials

Simplify passwords for users and put the burden on the authentication system

Brought to you by
Specops

How Embracing Micro-Segmentation Helps You Master PCI Compliance

How Embracing Micro-Segmentation Helps You Master PCI Compliance

The art of mastering PCI DSS compliance is primarily about defining the scope of compliance

Brought to you by
Guardicore

Our Bloggers

What’s Hot on Infosecurity Magazine?