Infosecurity Blogs
5 Ways to Stop Ransomware in its Tracks
There are several key measures organizations can take to stop ransomware attacks in their tracks
Why Cloud Architectures and Configurations are Like Eating Pizza and Building Lego
Migrating to the cloud can be full of promise, but organizations should understand what’s required in their slice of the cloud pie
Top 5 Mobile Device Security Tips
What five steps should organizations take to secure their employees’ mobile devices?
Zero Trust for Insider Access
Insider access has emerged as a new threat. Implementing components of zero trust architecture can prevent internal attacks and protect networks and systems
Best Practices for Securing Your APIs
API breaches are on the rise and are having a dramatic impact on businesses. Organizations should follow four best practice steps to protect APIs
The Next Equifax Attack...That Never Happened
Although a cyber-attack similar to the infamous Equifax breach was thwarted, it shows the urgent need to address digital supply chain security
Tailored Administration: A Catalyst for Zero Trust Architecture
Zero trust architectures are important, but implementation issues persist. Fortunately, a tailored, custom administration can make it achievable
The Rise of Initial Access Brokers
How can orgs protect themselves against initial access brokers?
Driving Efficiency with Integrated Management Systems: An OCTO Telematics Case Study
OCTO Telematics CISO, Attilio De Bernardo, explains how his organization uses an integrated management system and certification to improve its security posture
Linux-based Malware Requires Linux Focused Cybersecurity Strategy
Trend Micro's Erin Sindelar considers the Linux-focused cybersecrity strategy needed to tackle an increase in Linux-based malware
Creating a Secure Solution Development Lifecycle for Healthcare
What is SSDLC and can this enhance the security of healthcare organizations?
The Rise of Device Encryption
Company-wide encryption of data is being increasingly recognized as a straightforward way of mitigating the risk of data breach
Parting Shots From Former Editor, Michael Hill
Former Infosecurity Editor, Michael Hill, reflects on his time at Infosecurity Magazine
6 Important Questions About Anomaly Detection
Anomaly detection is vital in identifying activity that does not conform to an expected pattern. But what is it?
Smishing: Analyzing Sophisticated Scam Methods
The rise of more sophisticated smishing methods has exacerbated the growing threat environment
Hello From Your New Deputy Editor
Our new deputy editor introduces himself and explains why he joined Infosecurity Magazine
Proactive Approach to Soft Skills Gap Needed in Security Industry
There are huge opportunities in the security industry for those who develop their soft skills
Defining Cybersecurity in a Hybrid World
As many employees return to the office, what security issues do organizations need to focus on?
Securing Containers: Seven Key Concerns and What to Do About Them
When building out a security strategy for containers, there are generally seven primary concerns. This article explains what they are, and what to do
Here’s What Universities Need to Know About Cyber-Attacks
A recent spate of ransomware attacks, suggests that cyber-criminals are taking advantage of the weaknesses of the new hybrid learning model at Universities. Here are three lessons universities need to quickly learn to avoid falling victim to devastating cyber-attacks