Infosecurity Blogs
How to Solve Third-Party Remote Access Problems in Manufacturing
Under Industry 4.0 securing OT, ICS and PLC systems is more important than ever before
The Role of Cloud Services in the Hybrid War in Ukraine
Threat actors linked to the Russia-Ukraine war are increasingly seeking to exploit cloud services
Outsourcing Cyber Risk: Why an Integrated Approach is Critical
While many organisations are looking for a silver bullet to combat all threats, there is no such thing as a one-size-fits-all approach
Looking East: Japanese Credit Card Customers Targeted With Phishing Attacks
The threat actor was likely to have been of Chinese origin
The Challenge of Shadow OT
No matter how your ICS/OT environment is connected, it needs to be secured
Keeping up with the Attackers: Educating Staff on New Monkeypox Themed Phishing Campaigns
Threat actors exploit public wariness surrounding new medical concerns
How Russian Information Operations Are Trying to Win the War
A whole-of-community response is required to counter Russian attempts to undermine and divide the Western coalition
Rise in Ransomware: Exploring the Driving factors
Ransomware attacks continue to dominate headlines and are on the rise
Hello From Your New Editor
A quick introduction from the new editor at Infosecurity Magazine
A Guide to User Access Monitoring and Why it is Important
Third-party user access monitoring is vital but is often overlooked or carried out manually
An Inside Look at Hive’s RaaS Tactics
The Hive group's aggressive tactics and regular variant upgrades make it a formidable adversary
Compliance vs Security: A Look into Passwords
New research shows that relying on compliant passwords does nothing to protect your network
Digital Trust: From Brand Damaging to Brand Managing
How can organizations achieve consumer confidence in their security and privacy posture?
What You Should Do When Two-Factor Authentication Becomes a Security Requirement
The desire for enhanced digital security has caught the attention of governments around the world, all looking to protect consumers and businesses
How Ransomware Has Become a Geopolitical Risk for Governments
There has been a significant escalation in attacks targeting government organizations this year
The Industrial Cyber-Attack Evolution: How to Keep Your Network Safe
Industrial organizations face growing cyber threats - how can they stay one step ahead of the attackers?
Stand Down, Marketers: Zero Trust is Not a Product
If correctly understood and carefully implemented, zero trust has a huge amount to offer organizations of every size
Browser exploits: A Concerning Revival Led by the Lazarus Group
The notorious Lazarus group is spearheading growing efforts to leverage zero-day vulnerabilities in the browser
Modern Authentication for Multiple User Journeys - Best Guidance
If implemented properly, modern authentication can secure a growing attack surface and avoid security burnout
Cyber Essential’s Password-Based Authentication Requirements
Cyber Essentials revised its password-based authentication requirements in 2022 as a response to the ever-changing threat landscape