Infosecurity Blogs

  1. #BlackFriday: Preparing for Online Shopping Scams This Holiday Season

    Javvad Malik highlights the types of scams consumers should be looking out for this year's holiday shopping season

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  2. Template Injection Attacks: Protecting Against Camouflaged URLs

    Organizations can no longer rely on traditional security tools to protect against advanced threats

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  3. The Enemy Has Deep Pockets: How safe are your user accounts?

    Understand the latest techniques bot operators are using to bypass traditional detection methods and what to do to avoid falling victim to an attack

    1. Photo of Antoine  Vastel, PhD

      Antoine Vastel, PhD

      VP of Research, DataDome

  4. How to be Mindful of Security Threats During the FIFA World Cup

    How are cyber-attackers likely to target the upcoming FIFA football world cup, and how can these threats be mitigated?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  5. Solving the Cybersecurity Permacrisis

    Enterprises that make the time and space for their security staff to learn will achieve much higher levels of security

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  6. How Schools Can Become Cyber Resilient in 2023

    Threat actors continue to target schools and the data they hold. This article provides advice and tips on how they cany protect themselves from an attack.

    1. Photo of Kylie  Ruiz

      Kylie Ruiz

      Senior Product Marketing Manager, Secure Link

  7. Microsoft 365 Apps Continue to be the Most Exploited Cloud Services

    As attacks on cloud applications grow, it is essential that businesses gain greater visibility over their cloud infrastructure

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  8. Data Protection is the Heart of Zero Trust, Forrester Reports

    Fasoo's Ron Arden analyses Forrester's latest report, The Definition of Modern Zero Trust

    1. Photo of Ron Arden

      Ron Arden

      Executive Vice President, CTO and COO, Fasoo

  9. Protecting Your Business as DDoS Attacks Set to Surge

    From politically motivated efforts to ransom extortion, nobody is safe from getting hit by a DDoS attack.

    1. Photo of Ramil Khantimirov

      Ramil Khantimirov

      CEO and co-founder of StormWall

  10. ID Authentication Bypass and the Next Evolution in Phishing Campaigns

    New insights highlight the sophistication of modern phishing packages available to budding fraudsters

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  11. The Increasingly Complex Threat Landscape Must Be Fought With Simplicity

    New research shows that 65% of UK and US CI organizations have fallen victim to a cyber-attack

    1. Photo of Dan Turner

      Dan Turner

      VP for Forcepoint G2CI, Forcepoint

  12. Interactive Malware Sandbox in Your Security System

    Understand how to overcome the issues of traditional antiviruses with an online malware sandbox

    1. Photo of Stas Gaivoronskii

      Stas Gaivoronskii

      Malware Analyst, ANY.RUN

  13. Template Injection Attacks: Mitigating Modern Threats

    The Menlo Labs Team has recently observed a spike in template injection attacks

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  14. An Analysis of Security Vulnerability Trends During COVID-19

    What were the security vulnerability trends during COVID-19?

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  15. Why Zero Trust and Identity and Access Management are Essential to Enterprise Security

    Discover why turning to Zero Trust is important to be able to secure an organization's operations

    1. Photo of Russell Dowdell

      Russell Dowdell

      Senior Manager, Product Management, SecureLink

  16. Combating CNI Security Concerns in a Complex Climate

    An attack on critical infrastructure remains an ongoing concern for cybersecurity professionals and there is a need for best practices to be followed

    1. Photo of Dan Turner

      Dan Turner

      VP for Forcepoint G2CI, Forcepoint

  17. Cross-Functional Collaboration is Becoming Essential for Security Professionals

    The threats facing organizations today are too numerous and complex to be dealt with exclusively by the security team

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  18. Qakbot: Analysing a Modern-Day Banking Trojan

    Attackers are using increasingly innovative methods to launch the Qakbot Trojan

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  19. Initial Access Brokers and Blocking the Continued March of Ransomware

    IABs have made ransomware attacks easier for affiliate groups and organizations need to respond

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  20. Observing the Changing Nature of Security within Organizations

    Understand why an organization's security posture must align with business objectives

    1. Photo of Rich Foltak

      Rich Foltak

      CISO, Dito

What’s hot on Infosecurity Magazine?