Infosecurity Opinions

HowTo: Fight Cyber-Threats in the Metaverse

HowTo: Fight Cyber-Threats in the Metaverse

Now is the time to invest in training the architects of the Metaverse to navigate its security threats

Tech Addiction and Work Burnout Make us Prone to Phishing Attacks

Tech Addiction and Work Burnout Make us Prone to Phishing Attacks

Confronting the issues related to tech addiction will help your organization combat the potential of cyber-attacks

#HowTo: Build Trust in Your Software Through Insights

#HowTo: Build Trust in Your Software Through Insights

Organizations can benefit from learning from the experiences of peers to improve their software security

Cybersecurity Awareness: An Open Letter to CISOs

Cybersecurity Awareness: An Open Letter to CISOs

Now is the time to focus on long-term behavioral change rather than cybersecurity awareness, says Oz Alashe

How DDoS Disrupts Live Events

How DDoS Disrupts Live Events

DDoS is often a favorite of hacktivist groups and trolls, especially when targeting a live, publicly broadcast event

#HowTo: Secure Your Cloud Migration

#HowTo: Secure Your Cloud Migration

Organizations must take action to strengthen its security posture amid cloud migration

What the Growth of Ransomware Variants Says About the Evolving Cybercrime Ecosystem

What the Growth of Ransomware Variants Says About the Evolving Cybercrime Ecosystem

Researchers have observed 10,666 ransomware variations in the past six months

Cyberwar is Changing – is Your Organization Ready?

Cyberwar is Changing – is Your Organization Ready?

Today, cyberwarfare is the most convenient, asymmetrical and cost-effective way for countries and bad actors to conduct warfare

#HowTo: Build Trust Between Developers and Security Teams

#HowTo: Build Trust Between Developers and Security Teams

To make software more secure, we must overcome cultural differences between developers and security teams

Implementing Connected Place Cybersecurity Principles

Implementing Connected Place Cybersecurity Principles

What are the challenges authorities face when adopting the NCSC Cyber Security Principles?

#CyberMonth: A Time to Change Behaviors

#CyberMonth: A Time to Change Behaviors

KnowBe4 security experts share their experiences of helping change people's behaviors

#HowTo: Protect the Public Sector from Increasing and Sophisticated Ransomware Attacks

#HowTo: Protect the Public Sector from Increasing and Sophisticated Ransomware Attacks

Recent attacks on the public sector show these organizations need to be hyper-focused on protecting themselves

What’s Hot on Infosecurity Magazine?