Infosecurity Blogs

  1. Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts

    Worryingly, companies still rely on conventional solutions to assess bots

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  2. Tackling the Emerging Threat of Session Hijacking and MFA Bypass

    Cyber-criminals are finding ways to bypass MFA - how can organizations respond?

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  3. What Does Zero Trust Mean for MSPs?

    MSPs benefit from zero trust because it implies a long-term relationship with customers

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  4. Unraveling the Challenges of Log4j

    Log4j is particularly dangerous, so what is the solution in combatting it?

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  5. Why Remote Access in Manufacturing is a Dangerous Game

    Any investment in securing third-party access points is an investment in the greater good of your organization

    1. Photo of Russell Dowdell

      Russell Dowdell

      Senior Manager, Product Management, SecureLink

  6. Celebrating a New Era for Infosecurity Europe and Cyber House Party

    For the first time, Cyber House Party will be held during Infosecurity Europe, on Wednesday June 22

  7. Protecting All Users Is What's Next for MFA

    Truly increasing MFA adoption requires a more fundamental shift in the organization’s security posture

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  8. Phishing Takeaways from the Conti Ransomware Leaks

    Phishing-related takeaways Cofense Intelligence analysts discovered in the Conti leaks

    1. Photo of Brad Haas

      Brad Haas

      Cyber Threat Intelligence Analyst, Cofense

  9. GDPR and Google Analytics – Privacy Concerns and Compliance Steps

    Harman Singh explains how organizations can ensure they follow GDPR rules using Google Analytics

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  10. I'm @InfosecEditor...Get Me Out of Here!

    Eleanor Dallaway reflects on her 15 years as Infosecurity Magazine Editor and announces that it’s time for someone else to take a spin in the editor’s chair.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  11. New OWASP Top 10: Beware of Poor Security Practices

    The OWASP Top 10 list, with good security practices and solutions, makes it easier to enforce better security posture

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  12. Why “Shields Up” Starts with Understanding and Protecting the Attack Surface

    With the threat of en masse cyber-attacks from Russia, organizations should develop a 'Shields Up' security strategy

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  13. OWASP Risk Ranking Changes Reflect Transforming and Dynamic Nature of Security

    The changes in the relative ranking of each application security risk and what they mean to you

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  14. Has Your Code Leaked?

    How to find out if your company is a victim of a source code leak

    1. Photo of Thomas Segura

      Thomas Segura

      Content Writer, GitGuardian

  15. The Most In-Demand Cyber Skill for 2022

    A new category was rated as the most in-demand cybersecurity skill during this year's annual ISACA report

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  16. The Power of Foresight

    Without a certified business continuity management system, businesses leave themselves open to risk

    1. Photo of Rob Acker

      Rob Acker

      ICT Technical Manager, LRQA

  17. What is Adaptive Security?

    We must embrace new methodologies built to specifically address today’s evolving threats

    1. Photo of Ashley Guerra

      Ashley Guerra

      Product Marketing Manager, SecureLink

  18. Capitalizing on a Crisis: What Global Events Mean for Cybersecurity

    Cyber threats emanating from the Russia Ukraine are widespread and indiscriminate, and organizations must be prepared

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  19. OWASP Shines Light on Three New Risk Categories

    Security teams must consider the new categories when looking to protect against today’s application security risks

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  20. Cloud Services Are Increasingly Exploited for Command and Control in Cyber Espionage Operations

    Threat actors are making the most of cloud services for malicious purposes, so organizations should do the same for their security

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

What’s hot on Infosecurity Magazine?