Infosecurity Blogs

  1. SEO Poisoning: The New Normal Brings New Threats

    SEO poisoning demonstrates the acknowledgment of attackers that remote and hybrid business models have resulted in increased use of the browser

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  2. Gearing Up for Another Cyber House Party Christmas

    Next week sees the return of the popular Cyber House Party Christmas Bash!

  3. Growing Pain Points in Hybrid Cloud

    Businesses should focus on two critical areas: 5G “garbage collection” and shadow cloud

    1. Photo of William Malik

      William Malik

      VP of Infrastructure Strategies, Trend Micro

  4. Firewalls and Security Protocols Alone Cannot Keep Hackers Out

    Enterprises need a solution to help secure personal data for business use while not placing it at risk of theft

    1. Photo of Keunjin Kim

      Keunjin Kim

      Founder and CEO, Spiceware

  5. Cloud Accounts: A Growing Target for Opportunistic and State-Sponsored Threat Actors

    With users being the new perimeter, attackers are focusing their efforts on cloud identities

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  6. Improve Visibility for a Secure Cloud Migration

    Why a security services platform is the solution IT and developer teams need

    1. Photo of Andrew Stevens

      Andrew Stevens

      Director of Product Marketing, Trend Micro

  7. Scanning Docker Images for Secrets

    Owing to their structure and usage, docker images are likely to contain hidden secrets

    1. Photo of Thomas Segura

      Thomas Segura

      Content Writer, GitGuardian

  8. Education Could Be the Test for Cyber-Attackers

    Why education institutions are vulnerable to data loss and theft and a tempting target for hackers

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  9. #BlackFriday: The Holidays Are Around the Corner, and so Are the Scammers!

    Javvad Malik offers advice to online shoppers about how to stay secure over the upcoming shopping season

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  10. Serverless and Application Security

    Why organizations need a comprehensive, purpose-built tool for serverless security

    1. Photo of Tal Melamed

      Tal Melamed

      Senior Director, Cloud Native Security Research, Contrast Security

  11. Cloud Security Posture Management (CSPM) Is Insufficient Without Visibility

    CSPM is critical, but security teams need additional visibility and improved accuracy

    1. Photo of Kurt Van Etten

      Kurt Van Etten

      Chief Product Officer, RedSeal

  12. FISMA Requirements: Are You Compliant?

    Why complying with FISMA also extends into data destruction and device disposal practices

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  13. Simplifying Cloud Compliance Through Automation

    In the cloud computing world, conforming to compliance standards and regulations sets you up for success

    1. Photo of Andrew Stevens

      Andrew Stevens

      Director of Product Marketing, Trend Micro

  14. UK GDPR Post-Brexit: Everything You Need to Know

    Harman Singh sets out the implications of the UK's new data protection regime post-Brexit

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  15. Overcoming the 3 Biggest Challenges in System Hardening

    Why it's essential an organization picks the right approach to system hardening – automated or non-automated

    1. Photo of Keren Pollack

      Keren Pollack

      Marketing Manager, CalCom

  16. Post-pandemic Growth Starts With Understanding Cyber Risk

    Only a security-by-design culture can enable organizations to deliver digital innovation projects effectively

    1. Photo of Bharat Mistry

      Bharat Mistry

      Technical Director for UK and Ireland, Trend Micro

  17. Why Cloud Security Posture Management Is Essential to Your Overall Security Plan

    CSPM is quickly becoming the best way to close the gaps in your security posture

    1. Photo of Mike Lloyd

      Mike Lloyd

      CTO of RedSeal

  18. Four Reasons Why Application Security is an Enabler for All Businesses

    Vinugayathri Chinnasamy shares four undeniable reasons why application security is a business enabler

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  19. Automating Cloud Security

    Why an automated cloud-native security solution can help save your organization time, money and frustration

    1. Photo of Andrew Stevens

      Andrew Stevens

      Director of Product Marketing, Trend Micro

  20. Hybrid Working: Stopping Cyber-Attacks at Source

    How can organizations tackle the challenges associated with hybrid and remote working?

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

What’s hot on Infosecurity Magazine?