Infosecurity Blogs

  1. Why 100% of CEH Professionals Would Recommend the Certification to Their Peers: Insights from the CEH HOF 2025 Industry Report

    According to the CEH Hall of Fame 2025 Industry Report , 100% of CEH Hall of Fame inductees attribute their career success and enhanced workplace recognition to the Certified Ethical Hacker (CEH) certification

  2. How Simple IAM Control Could Have Prevented Major Cyber-Attacks

    Why self-service password reset with MFA is more than just a convenience – it’s a critical layer of defense

    1. Photo of Donnie  Batz

      Donnie Batz

      Senior Sales Engineer, One Identity

  3. How Worried Should Consumers Really Be After a Data Breach?

    Specops discuss the action consumers should take when they receive a data breach notification

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  4. Identity Theft Isn’t a Hacking Problem, It’s a Data Problem - Here’s How to Fix It

    Identity theft is primarily a data problem, not just a hacking issue, as thieves exploit readily available personal information. Protecting yourself involves removing information from data brokers, being selective about online sharing, and monitoring accounts. Proactive data exposure management is crucial for identity protection

    1. Photo of Mariam  Volobueva

      Mariam Volobueva

      Lead Copywriter, Incogni

  5. Don’t Act in Isolation: Transforming Malware Intelligence in the AI Era

    As cybercriminals use AI to boost the scale and sophistication of malware attacks, Justin Grosfelt, Manager of the Reversing, Emulation, and Testing (RET) Team, Insikt Group, Recorded Future, looks at how defenses must evolve to stay ahead of a new era of threats

    1. Photo of Justin  Grosfelt

      Justin Grosfelt

      Manager of the Reversing, Emulation, and Testing (RET) Team, Insikt Group, Recorded Future

  6. How to Recover My Archived PST Files in Outlook

    Learn how to recover archived PST files in classic Outlook and new Outlook

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  7. Why One-Off Pen Tests Could Be Leaving You at Risk

    Annual penetration test only provides security validation for a single moment in time and might lead to undiscovered vulnerabilities. Could combining in-depth penetration tests with continuous monitoring on the other hand, help alleviate this issue?

    1. Photo of Patrick Lehnis

      Patrick Lehnis

      Marketing Manager, Outpost24

  8. Predicting Primes: Is This Discovery a Problem for Encryption?

    New research claims prime numbers can now be predicted, potentially weakening encryption methods like RSA. While this poses risks to cybersecurity, it also opens doors to more efficient cryptographic systems

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  9. How Does EASM Go Beyond Vulnerability Management?

    This article explores external attack surface management and how it extends beyond traditional vulnerability management to give organizations a more complete view of their security gaps and vulnerabilities

    1. Photo of Marcus  White

      Marcus White

      Cybersecurity Specialist, Specops Software – An Outpost24 Company

  10. Low Effort, High Reward: How Nailing Basic Cyber Hygiene Makes an Organization Stronger in the Age of the ‘Novel’ Attack Vector

    This article argues that by prioritizing cyber hygiene—patching systems, training staff, and consolidating tools—organizations can build stronger defenses and free up resources to tackle more sophisticated threats when they do arise

    1. Photo of Mark Weir

      Mark Weir

      Regional Director, UK & Ireland, Check Point Software

  11. When it Comes to AI Cybersecurity Tools, We’re Always Buying Vibes

    Matt Muller discusses how organizations can cut through the noise in the AI cybersecurity product marketplace

    1. Photo of Matt Muller

      Matt Muller

      Field CISO, Tines

  12. Why Self-hosted WAFs Are Making a Comeback and How SafeLine Leads the Trend

    SafeLine is a self-hosted WAF with strong security, full data control, and low cost. Deploy in one command, configure easily, no expertise needed. Beginner-friendly yet powerful, it’s the perfect Cloudflare alternative for SMBs seeking affordable, reliable protection

    1. Photo of Monster Lee

      Monster Lee

      Global Director, SafeLine WAF

  13. From Entry to Escalation: Rethinking Account Takeover Mitigation Strategies

    In today’s threat landscape, companies need more than MFA enforcement. They need smarter, layered security controls that defend against MFA bypasses

    1. Photo of Marc Maguire

      Marc Maguire

      Solution Architect, One Identity

  14. Breached Passwords? Account Takeover (ATO) Attacks Might Be Next

    The rise of AI-generated deepfakes, automated credential stuffing, and advanced fraud tools has made ATO attacks even more effective at bypassing security defenses

    1. Photo of Marcus White

      Marcus White

      Cybersecurity Content Lead, Specops Software – An Outpost24 Company

  15. How to Recover Deleted Data from SQL Server without Backup

    If you want to recover deleted data in SQL Server directly, use an advanced SQL recovery tool, like Stellar Repair for MS SQL

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  16. Self-Motivation: The Key to Working in Cybersecurity

    In today's competitive job market, self-motivated job seekers must understand industry trends and leverage their unique strengths to stand out from other candidates

    1. Photo of Jon Brandt

      Jon Brandt

      Director, Professional Practices and Innovation, ISACA

  17. Can AI Help Protect Passwords from Hackers?

    AI is revolutionizing cybersecurity by both enabling hackers and empowering defenders. It enhances password protection through adaptive authentication, real-time threat detection, and behavioral biometrics, while also being exploited for sophisticated attacks like phishing, credential stuffing, and MFA bypass. Organizations must leverage AI-driven tools to counter evolving threats

    1. Photo of Marcus White

      Marcus White

      Cybersecurity Content Lead, Specops Software – An Outpost24 Company

  18. 5 Questions CISOs Should Ask Third-Party Vendors

    Recent third-party attacks have highlighted the importance of vetting vendors before signing on with them

    1. Photo of Gerald Beuchelt

      Gerald Beuchelt

      CISO, Acronis

  19. Remote Control Cybercrime: An RMM Protection Guide for MSPs

    Using data from the recent Acronis Cyberthreats Report, this article summaraizes threats to RMM applications and outlines a concise strategy for MSPs to protect their systems

  20. Why SharpRhino Malware is Leaving Victims Thunderstruck

    Threat actor Hunters International is deploying a new RAT called SharpRhino, which is creating significant challenges for security teams

What’s hot on Infosecurity Magazine?