Infosecurity Blogs

Driving Efficiency with Integrated Management Systems: An OCTO Telematics Case Study

Driving Efficiency with Integrated Management Systems: An OCTO Telematics Case Study

OCTO Telematics CISO, Attilio De Bernardo, explains how his organization uses an integrated management system and certification to improve its security posture

Brought to you by
Lloyd's Register

Linux-based Malware Requires Linux Focused Cybersecurity Strategy

Linux-based Malware Requires Linux Focused Cybersecurity Strategy

Trend Micro's Erin Sindelar considers the Linux-focused cybersecrity strategy needed to tackle an increase in Linux-based malware

Brought to you by
Trend Micro

Creating a Secure Solution Development Lifecycle for Healthcare

Creating a Secure Solution Development Lifecycle for Healthcare

What is SSDLC and can this enhance the security of healthcare organizations?

The Rise of Device Encryption

The Rise of Device Encryption

Company-wide encryption of data is being increasingly recognized as a straightforward way of mitigating the risk of data breach

Brought to you by
Apricorn

Parting Shots From Former Editor, Michael Hill

Parting Shots From Former Editor, Michael Hill

Former Infosecurity Editor, Michael Hill, reflects on his time at Infosecurity Magazine

6 Important Questions About Anomaly Detection

6 Important Questions About Anomaly Detection

Anomaly detection is vital in identifying activity that does not conform to an expected pattern. But what is it?

Smishing: Analyzing Sophisticated Scam Methods

Smishing: Analyzing Sophisticated Scam Methods

The rise of more sophisticated smishing methods has exacerbated the growing threat environment

Hello From Your New Deputy Editor

Hello From Your New Deputy Editor

Our new deputy editor introduces himself and explains why he joined Infosecurity Magazine

Proactive Approach to Soft Skills Gap Needed in Security Industry

Proactive Approach to Soft Skills Gap Needed in Security Industry

There are huge opportunities in the security industry for those who develop their soft skills

Defining Cybersecurity in a Hybrid World

Defining Cybersecurity in a Hybrid World

As many employees return to the office, what security issues do organizations need to focus on?

Securing Containers: Seven Key Concerns and What to Do About Them

Securing Containers: Seven Key Concerns and What to Do About Them

When building out a security strategy for containers, there are generally seven primary concerns. This article explains what they are, and what to do

Brought to you by
Trend Micro

Here’s What Universities Need to Know About Cyber-Attacks

Here’s What Universities Need to Know About Cyber-Attacks

A recent spate of ransomware attacks, suggests that cyber-criminals are taking advantage of the weaknesses of the new hybrid learning model at Universities. Here are three lessons universities need to quickly learn to avoid falling victim to devastating cyber-attacks

Brought to you by
Sophos

Our Bloggers

What’s Hot on Infosecurity Magazine?