Infosecurity Blogs
Securing Software: The Root Cause Conundrum
DevSecOps is part of the answer to producing secure software, but it's not enough
Integrating XDR into your SOC
Discover the top myths around XDR, EDR and MDR and look into how to integrate XDR effectively into your SOC, without breaking the bank
Reduce risk and innovate anywhere with a Cloud without Compromise
Why the vision of the future cannot be based on the paradigm of the past
Debunking Hard Drive Destruction Misconceptions
The correct path is following NSA standards and degaussing all magnetic media
Fixing a Common Active Directory Weakness: Poor Authentication Security
This article dives into one common AD weakness – poor authentication security – and how to address it to improve the organization’s overall security posture
Think Your End-of-Life Data is Destroyed? Think Again!
It is a scary but familiar misbelief that simply erasing drives clean is enough to keep your information safe
ISOMorph and HTML Smuggling
How should organizations combat the re-emergence of HTML smuggling?
Elevated Cyber-risk as Companies Choose Speed Over Security
To lower cyber-risk, organizations must be better prepared by going back to basics
Is Complacency the Biggest Cyber Threat?
What does ISACA's recent State of Cybersecurity report tell us about the best ways to tackle rising cyber-attacks?
Top 5 Secrets for Mitigating Cyber-attacks in Microsoft 365 Environments
Five renowned experts share best practices for preventing and mitigating cyber-attacks in Microsoft 365 environments
Cybersecurity, Community and Change: How to Meet the Coming Challenge
As we enter the fourth industrial revolution, we require a community effort to reskill and upskill people into digital security careers
How to Tackle Open Source Vulnerabilities While Closing the DevOps/SecOps Gap
Creating more efficiency in the workplace often involves tearing down silos and increasing cross-functional collaboration to deliver better outcomes
How to Repair Corrupt Exchange Database using the EseUtil Tool
In this article, we explain the six steps to repair a corrupt Exchange database
Ransomware – Three Questions to Ask Your Cybersecurity Teams
When it comes to cybersecurity threats, there are three essential questions to ask to determine how prepared you are for a ransomware attack.
Tales From the SOC: Dealing with the Dangers of Freeware
AT&T's SOC team highlight the dangers of downloading freeware
Embrace your Business Reality with a Strong Hybrid Cloud Strategy
Whether fully cloud native, in the middle of a migration process or beginning the move, several benefits come from implementing a solid hybrid cloud approach
Top 5 Data Breaches in History
The biggest, strangest and most embarrassing data breaches in history
Ransomware: Why it is on the Rise, and How Can Companies Respond?
A zero trust approach and isolation technology are key to preventing ransomware infections
Top Five Hacking Portrayals in Movies and TV
What have been the best portrayals of hacking in TV and films over the years?
How Much Do Hackers Pay for Stolen Personal Data on the Dark Web?
Privacy Affairs investigated how the dark web market has changed and adapted since 2020. Here are some of their findings: