Infosecurity Blogs

  1. 5 Ways to Stop Ransomware in its Tracks

    There are several key measures organizations can take to stop ransomware attacks in their tracks

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  2. Why Cloud Architectures and Configurations are Like Eating Pizza and Building Lego

    Migrating to the cloud can be full of promise, but organizations should understand what’s required in their slice of the cloud pie

    1. Photo of Raphael Bottino

      Raphael Bottino

      Solutions Architect, Trend Micro

  3. Top 5 Mobile Device Security Tips

    What five steps should organizations take to secure their employees’ mobile devices?

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  4. Zero Trust for Insider Access

    Insider access has emerged as a new threat. Implementing components of zero trust architecture can prevent internal attacks and protect networks and systems

    1. Photo of Daniel Fabbri

      Daniel Fabbri

      Chief Data Scientist, Secure Link

  5. Best Practices for Securing Your APIs

    API breaches are on the rise and are having a dramatic impact on businesses. Organizations should follow four best practice steps to protect APIs

    1. Photo of Pankaj Gupta

      Pankaj Gupta

      Senior Director, Citrix

  6. The Next Equifax Attack...That Never Happened

    Although a cyber-attack similar to the infamous Equifax breach was thwarted, it shows the urgent need to address digital supply chain security

    1. Photo of Nethanel Gelernter

      Nethanel Gelernter

      Founder and CEO, Cyberpion

  7. Tailored Administration: A Catalyst for Zero Trust Architecture

    Zero trust architectures are important, but implementation issues persist. Fortunately, a tailored, custom administration can make it achievable

    1. Photo of Kayla Gesek

      Kayla Gesek

      Product manager, OneLogin

  8. The Rise of Initial Access Brokers

    How can orgs protect themselves against initial access brokers?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  9. Driving Efficiency with Integrated Management Systems: An OCTO Telematics Case Study

    OCTO Telematics CISO, Attilio De Bernardo, explains how his organization uses an integrated management system and certification to improve its security posture

    1. Photo of Katerina Liana

      Katerina Liana

      Lead Certification Specialist, Lloyd's Register

  10. Linux-based Malware Requires Linux Focused Cybersecurity Strategy

    Trend Micro's Erin Sindelar considers the Linux-focused cybersecrity strategy needed to tackle an increase in Linux-based malware

    1. Photo of Erin Sindelar

      Erin Sindelar

      Threat Researcher & Communicator, Trend Micro

  11. Creating a Secure Solution Development Lifecycle for Healthcare

    What is SSDLC and can this enhance the security of healthcare organizations?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

    3. Tom Stowell

      senior security risk engineer

  12. The Rise of Device Encryption

    Company-wide encryption of data is being increasingly recognized as a straightforward way of mitigating the risk of data breach

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  13. Parting Shots From Former Editor, Michael Hill

    Former Infosecurity Editor, Michael Hill, reflects on his time at Infosecurity Magazine

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  14. 6 Important Questions About Anomaly Detection

    Anomaly detection is vital in identifying activity that does not conform to an expected pattern. But what is it?

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  15. Smishing: Analyzing Sophisticated Scam Methods

    The rise of more sophisticated smishing methods has exacerbated the growing threat environment

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  16. Hello From Your New Deputy Editor

    Our new deputy editor introduces himself and explains why he joined Infosecurity Magazine

    1. Photo of Benjamin David

      Benjamin David

      Deputy Editor, Infosecurity Magazine

  17. Proactive Approach to Soft Skills Gap Needed in Security Industry

    There are huge opportunities in the security industry for those who develop their soft skills

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  18. Defining Cybersecurity in a Hybrid World

    As many employees return to the office, what security issues do organizations need to focus on?

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  19. Securing Containers: Seven Key Concerns and What to Do About Them

    When building out a security strategy for containers, there are generally seven primary concerns. This article explains what they are, and what to do

    1. Security Researcher

      Trend Micro

  20. Here’s What Universities Need to Know About Cyber-Attacks

    A recent spate of ransomware attacks, suggests that cyber-criminals are taking advantage of the weaknesses of the new hybrid learning model at Universities. Here are three lessons universities need to quickly learn to avoid falling victim to devastating cyber-attacks

    1. Photo of Jonathan Lee

      Jonathan Lee

      Director of Public Sector, Sophos

What’s hot on Infosecurity Magazine?