Infosecurity Opinions

How DDoS Disrupts Live Events

How DDoS Disrupts Live Events

DDoS is often a favorite of hacktivist groups and trolls, especially when targeting a live, publicly broadcast event

#HowTo: Secure Your Cloud Migration

#HowTo: Secure Your Cloud Migration

Organizations must take action to strengthen its security posture amid cloud migration

What the Growth of Ransomware Variants Says About the Evolving Cybercrime Ecosystem

What the Growth of Ransomware Variants Says About the Evolving Cybercrime Ecosystem

Researchers have observed 10,666 ransomware variations in the past six months

Cyberwar is Changing – is Your Organization Ready?

Cyberwar is Changing – is Your Organization Ready?

Today, cyberwarfare is the most convenient, asymmetrical and cost-effective way for countries and bad actors to conduct warfare

#HowTo: Build Trust Between Developers and Security Teams

#HowTo: Build Trust Between Developers and Security Teams

To make software more secure, we must overcome cultural differences between developers and security teams

Implementing Connected Place Cybersecurity Principles

Implementing Connected Place Cybersecurity Principles

What are the challenges authorities face when adopting the NCSC Cyber Security Principles?

#CyberMonth: A Time to Change Behaviors

#CyberMonth: A Time to Change Behaviors

KnowBe4 security experts share their experiences of helping change people's behaviors

#HowTo: Protect the Public Sector from Increasing and Sophisticated Ransomware Attacks

#HowTo: Protect the Public Sector from Increasing and Sophisticated Ransomware Attacks

Recent attacks on the public sector show these organizations need to be hyper-focused on protecting themselves

Cyber Skills Shortage is Caused by Analyst Burnout

Cyber Skills Shortage is Caused by Analyst Burnout

We have to work smarter and treat current industry professionals better to solve the cyber skills shortage

#HowTo: Prepare for the Worst in Cybersecurity

#HowTo: Prepare for the Worst in Cybersecurity

Under new regulations, financial services organizations and their suppliers need to prepare for when (not if) a cyber-attack happens

#CyberMonth: Staying Cyber Secure in an Increasingly Hostile Digital Environment

#CyberMonth: Staying Cyber Secure in an Increasingly Hostile Digital Environment

Organizations can do more to ensure teams are more cyber-aware this Cybersecurity Awareness Month

#HowTo: Get an Attacker’s Eye View of Your Security

#HowTo: Get an Attacker’s Eye View of Your Security

Mimicking an attacker’s eye view of your network will complement your existing traditional approach to security

What’s Hot on Infosecurity Magazine?