Infosecurity Blogs

Top 5 Data Breaches in History

Top 5 Data Breaches in History

The biggest, strangest and most embarrassing data breaches in history

Ransomware: Why it is on the Rise, and How Can Companies Respond?

Ransomware: Why it is on the Rise, and How Can Companies Respond?

A zero trust approach and isolation technology are key to preventing ransomware infections

Top Five Hacking Portrayals in Movies and TV

Top Five Hacking Portrayals in Movies and TV

What have been the best portrayals of hacking in TV and films over the years?

How Much Do Hackers Pay for Stolen Personal Data on the Dark Web?

How Much Do Hackers Pay for Stolen Personal Data on the Dark Web?

Privacy Affairs investigated how the dark web market has changed and adapted since 2020. Here are some of their findings:

5 Ways to Stop Ransomware in its Tracks

5 Ways to Stop Ransomware in its Tracks

There are several key measures organizations can take to stop ransomware attacks in their tracks

Why Cloud Architectures and Configurations are Like Eating Pizza and Building Lego

Why Cloud Architectures and Configurations are Like Eating Pizza and Building Lego

Migrating to the cloud can be full of promise, but organizations should understand what’s required in their slice of the cloud pie

Brought to you by
Trend Micro

Top 5 Mobile Device Security Tips

Top 5 Mobile Device Security Tips

What five steps should organizations take to secure their employees’ mobile devices?

Zero Trust for Insider Access

Zero Trust for Insider Access

Insider access has emerged as a new threat. Implementing components of zero trust architecture can prevent internal attacks and protect networks and systems

Brought to you by
SecureLink

Best Practices for Securing Your APIs

Best Practices for Securing Your APIs

API breaches are on the rise and are having a dramatic impact on businesses. Organizations should follow four best practice steps to protect APIs

Brought to you by
Citrix

The Next Equifax Attack...That Never Happened

The Next Equifax Attack...That Never Happened

Although a cyber-attack similar to the infamous Equifax breach was thwarted, it shows the urgent need to address digital supply chain security

Brought to you by
Cyberpion

Tailored Administration: A Catalyst for Zero Trust Architecture

Tailored Administration: A Catalyst for Zero Trust Architecture

Zero trust architectures are important, but implementation issues persist. Fortunately, a tailored, custom administration can make it achievable

Brought to you by
OneLogin

The Rise of Initial Access Brokers

The Rise of Initial Access Brokers

How can orgs protect themselves against initial access brokers?

Our Bloggers

What’s Hot on Infosecurity Magazine?