Infosecurity Blogs

  1. An Inside Look at Hive’s RaaS Tactics

    The Hive group's aggressive tactics and regular variant upgrades make it a formidable adversary

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  2. Compliance vs Security: A Look into Passwords

    New research shows that relying on compliant passwords does nothing to protect your network

    1. Photo of John Ward

      John Ward

      Cybersecurity Writer, Specops Software – An Outpost24 Company

  3. Digital Trust: From Brand Damaging to Brand Managing

    How can organizations achieve consumer confidence in their security and privacy posture?

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  4. What You Should Do When Two-Factor Authentication Becomes a Security Requirement

    The desire for enhanced digital security has caught the attention of governments around the world, all looking to protect consumers and businesses

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  5. How Ransomware Has Become a Geopolitical Risk for Governments

    There has been a significant escalation in attacks targeting government organizations this year

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  6. The Industrial Cyber-Attack Evolution: How to Keep Your Network Safe

    Industrial organizations face growing cyber threats - how can they stay one step ahead of the attackers?

    1. Photo of Daniel dos Santos

      Daniel dos Santos

      head of security research, Forescout

  7. Stand Down, Marketers: Zero Trust is Not a Product

    If correctly understood and carefully implemented, zero trust has a huge amount to offer organizations of every size

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  8. Browser exploits: A Concerning Revival Led by the Lazarus Group

    The notorious Lazarus group is spearheading growing efforts to leverage zero-day vulnerabilities in the browser

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  9. Modern Authentication for Multiple User Journeys - Best Guidance

    If implemented properly, modern authentication can secure a growing attack surface and avoid security burnout

    1. Photo of Danna Bethlehem

      Danna Bethlehem

      Director Product Marketing, Access Management & Authentication, Thales

  10. Cyber Essential’s Password-Based Authentication Requirements

    Cyber Essentials revised its password-based authentication requirements in 2022 as a response to the ever-changing threat landscape

    1. Photo of John Ward

      John Ward

      Cybersecurity Writer, Specops Software – An Outpost24 Company

  11. Let’s Rethink Cybersecurity Training Investment

    We need to make training targeted to tasks we can realistically expect people to do

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  12. 2022: A Checklist for the Year of Heightened Cyber Risk

    Harman Singh sets out steps organizations need to take to protect themselves amid heightened cyber-risks

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  13. What Law Firms Need to Know About Cybersecurity

    Why law firms must put proactive security measures in place to detect and prevent data breaches

    1. Photo of Tori Taylor

      Tori Taylor

      Marketing Communications Specialist, SecureLink

  14. Cybercrime: A Clear and Present Danger

    Organizations need to rapidly respond to threats that strike throughout their entire network infrastructure

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  15. Travel and Hospitality Fraud is Growing: Here’s How it Works

    An underground market has developed around hospitality and travel fraud, and organizations and consumers must be aware

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  16. How Threat Actors Weaponize Your Trust

    Trust is one of the preferred weapons of any criminals, and organizations should adapt their security with this in mind

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  17. A Smarter Cyber-Risk Management Strategy

    Why you must integrate cyber-resilience into digital risk assurance programs tailored to the business

    1. Photo of Rob Acker

      Rob Acker

      ICT Technical Manager, LRQA

  18. New VIP3R Campaign Highlights the Dangers of Spearphishing

    A unique spearphishing campaign, VIP3R, highlights the growing sophistication of these types of threats

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  19. A Practical Lesson in Collaborative Security

    Collaboration is important to mitigating risk, remediating vulnerabilities and reaching compliance

    1. Photo of Yael Shasha

      Yael Shasha

      Director of Customer Experience, ActZero

  20. Empathy: The Overlooked Ingredient in Cybersecurity

    The cybersecurity industry needs to embrace empathy and honesty to help keep pace with cyber-threats

    1. Photo of Melissa Elza

      Melissa Elza

      vCPO, principal partner, HoneyBee HR

    2. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

What’s hot on Infosecurity Magazine?