News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Companies
»
Comarch
Comarch
Company
Content brought to you by Comarch
Nine Steps to Cybersecurity
Blog
5 February 2020
Using the Cloud: Seven Top Security Threats to Know About
Blog
30 January 2020
2020 Trends: Less is More in Security
Blog
3 January 2020
Mastering Mainframe Maintenance
White Paper
6 December 2019
Who Needs Data Center Security? Everyone
Blog
30 July 2019
The Importance of a Cybersecurity Strategy for the Business
Blog
11 June 2019
Fundamental Principles of Effective Data Protection
White Paper
2 April 2019
How to be Secure in the Challenging Business Landscape
Blog
1 April 2019
A Practical Guide To Outsourcing Your Service Desk
White Paper
8 November 2018
CRM Communication via Beacons with Security & Privacy in Mind
Blog
27 November 2017
A New Approach to Sensitive Data
White Paper
15 November 2017
Improving Network Security With Software-Defined Networking
Blog
30 October 2017
Huge Changes are Coming: it's Time to Prepare Technologically for GDPR
Blog
23 October 2017
Detection of Denial of Service Attacks in Modern Cloud Environments
White Paper
20 October 2017
Cutting the Phishing Line with User Authorization
Blog
16 October 2017
Is Your Company Ready to Face Tomorrow’s Security Risks?
Blog
9 October 2017
Interview: What is the Future of IT Security?
Blog
27 September 2017
Important Information on New EU Regulations
Blog
20 September 2017
In-House or Cloud? Where is More Secure?
Blog
12 September 2017
Security: Trends of Threats in 2017
Blog
4 September 2017
Security: A High-Stake Soccer Match
Blog
17 August 2017
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds
News
25 February 2026
1
Shai-Hulud-Like Worm Targets Developers via npm and AI Tools
News
23 February 2026
2
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls
News
23 February 2026
3
Jackpotting Surge Costs Banks Over $20m, Warns FBI
News
23 February 2026
4
Exploitable Vulnerabilities Present in 87% of Organizations
News
26 February 2026
5
UK's Data Watchdog Gets a Makeover to Match Growing Demands
News
26 February 2026
6
AI-powered Cyber-Attacks Up Significantly in the Last Year, Warns CrowdStrike
News
24 February 2026
1
New Zero-Click Flaw in Claude Desktop Extensions, Anthropic Declines Fix
News
9 February 2026
2
Shai-Hulud-Like Worm Targets Developers via npm and AI Tools
News
23 February 2026
3
Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
News
19 February 2026
4
Future-Proofing Critical Infrastructure: National Gas CTO Darren Curley on IT/OT Security Integration
Interview
18 February 2026
5
Why Ransomware Remains One of Cybersecurity’s Most Persistent and Costly Threats
News Feature
17 February 2026
6
How To Enhance Security Operations with AI-Powered Defenses
Webinar
15:00 —
16:00, 26 February 2026
1
What’s Next for AI Identity in 2026
Webinar
16:00 —
16:25, 24 February 2026
2
Why Your Organisation Needs Trusted Time Synchronisation
Webinar
15:00 —
16:00, 19 February 2026
3
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
15:00 —
16:00, 22 January 2026
4
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
16:00 —
17:00, 23 October 2025
5
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
6
The Intelligence Edge: Clarity, Context and the Human Advantage in Modern CTI
Webinar
15:00 —
16:00, 12 March 2026
1
Future-Proofing Critical Infrastructure: National Gas CTO Darren Curley on IT/OT Security Integration
Interview
18 February 2026
2
Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
News
3 February 2026
3
Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls
News
23 February 2026
4
Why Ransomware Remains One of Cybersecurity’s Most Persistent and Costly Threats
News Feature
17 February 2026
5
Psychology, AI and the Modern Security Program: A CISO’s Guide to Human Centric Defence
Opinion
6 February 2026
6
Close