Infosecurity Blogs
Hard Truth About Web Scraping Bot Attacks and Its 4 Business Impacts
Worryingly, companies still rely on conventional solutions to assess bots
Tackling the Emerging Threat of Session Hijacking and MFA Bypass
Cyber-criminals are finding ways to bypass MFA - how can organizations respond?
What Does Zero Trust Mean for MSPs?
MSPs benefit from zero trust because it implies a long-term relationship with customers
Unraveling the Challenges of Log4j
Log4j is particularly dangerous, so what is the solution in combatting it?
Why Remote Access in Manufacturing is a Dangerous Game
Any investment in securing third-party access points is an investment in the greater good of your organization
Celebrating a New Era for Infosecurity Europe and Cyber House Party
For the first time, Cyber House Party will be held during Infosecurity Europe, on Wednesday June 22
Protecting All Users Is What's Next for MFA
Truly increasing MFA adoption requires a more fundamental shift in the organization’s security posture
Phishing Takeaways from the Conti Ransomware Leaks
Phishing-related takeaways Cofense Intelligence analysts discovered in the Conti leaks
GDPR and Google Analytics – Privacy Concerns and Compliance Steps
Harman Singh explains how organizations can ensure they follow GDPR rules using Google Analytics
I'm @InfosecEditor...Get Me Out of Here!
Eleanor Dallaway reflects on her 15 years as Infosecurity Magazine Editor and announces that it’s time for someone else to take a spin in the editor’s chair.
New OWASP Top 10: Beware of Poor Security Practices
The OWASP Top 10 list, with good security practices and solutions, makes it easier to enforce better security posture
Why “Shields Up” Starts with Understanding and Protecting the Attack Surface
With the threat of en masse cyber-attacks from Russia, organizations should develop a 'Shields Up' security strategy
OWASP Risk Ranking Changes Reflect Transforming and Dynamic Nature of Security
The changes in the relative ranking of each application security risk and what they mean to you
The Most In-Demand Cyber Skill for 2022
A new category was rated as the most in-demand cybersecurity skill during this year's annual ISACA report
The Power of Foresight
Without a certified business continuity management system, businesses leave themselves open to risk
What is Adaptive Security?
We must embrace new methodologies built to specifically address today’s evolving threats
Capitalizing on a Crisis: What Global Events Mean for Cybersecurity
Cyber threats emanating from the Russia Ukraine are widespread and indiscriminate, and organizations must be prepared
OWASP Shines Light on Three New Risk Categories
Security teams must consider the new categories when looking to protect against today’s application security risks
Cloud Services Are Increasingly Exploited for Command and Control in Cyber Espionage Operations
Threat actors are making the most of cloud services for malicious purposes, so organizations should do the same for their security