Infosecurity Blogs

  1. How to Address Shortcomings in API Security

    ISACA's Sushila Nair explains why APIs security should be a top priority for organizations

    1. Photo of Sushila Nair

      Sushila Nair

      CEO, Cybernetic LLC

  2. Why the NCSC Cyber Assessment Framework is Important to the UK Public Sector

    The UK's NCSC has introduced the CAF to help organizations, especially those involved in CNI, assess and improve their cybersecurity practices to mitigate growing cyber threats

    1. Photo of Ann  Chesbrough

      Ann Chesbrough

      Vice President Product Marketing, BreachLock

  3. Seven Ways Hackers Can Access Company Information

    The increased digitization of businesses has made them more vulnerable to cyber-attacks, emphasizing the need for robust cybersecurity measures to protect sensitive information

    1. Photo of Sadie  Smith

      Sadie Smith

      Author, Bazoom Group

  4. Infosecurity Magazine Online Summit Autumn 2024 Day One Sessions

    You can find all the sessions from today’s Online Summit here including our keynote talk, fireside chat and panel discussions. Security by Design in Digital Transformation: Lessons from the National Trust

  5. Strategies to Balance Frictionless User Experience with Robust Security

    Organizations face the dual challenge of protecting their systems and applications while providing seamless access to users. Striking this balance is not only a technical requirement, but a business imperative

    1. Photo of Maxwell  Shofron

      Maxwell Shofron

      Sr. Solution Engineer Team Lead, One Identity

  6. CompTIA: A Launchpad for a Career in Cybersecurity

    The CompTIA A+ certification has global recognition, imparts basic knowledge and skills necessary for anyone wanting to build a career in cybersecurity

  7. How to Export Public Folder to PST in Microsoft Exchange

    Stellar’s Bharat Bushan provides ways to export Microsoft Exchange’s public folders to PST

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  8. Addressing the Frustrations and Concerns of Infosecurity Professionals

    Javvad Malik discusses the issues he found to be top of mind of cybersecurity professionals during Infosecurity Europe 2024

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  9. CrowdStrike Windows Outage: What We Can Learn

    ISACA’s Divya Aradhya sets out lessons software providers and end users can learn from the CrowdStrike Windows Outage on July 19

    1. Photo of Divya Aradhya

      Divya Aradhya

      Head of Cyber Architecture for Banking & International, Citi

  10. PAM For Small to Medium-Sized Enterprises: Comprehensive Protection Without Complexity

    Many enterprises are now prioritizing the implementation of privileged access management solutions to safeguard against cyber-attacks

    1. Photo of Phil Freeman

      Phil Freeman

      Senior Solutions Architect, One Identity

  11. SaaS Security in Europe: A Report Card

    More than 70% of organizations in Europe are now making SaaS cybersecurity a priority

    1. Photo of Hananel Livneh

      Hananel Livneh

      Head of Product Marketing, Adaptive Shield

  12. How to Secure Against Access Management’s Biggest Risks: Shadow IT and BYOD

    Legacy security tools struggle with today's work environment, but Extended Access Management secures both approved and unauthorized devices and applications

    1. Photo of Steve Won

      Steve Won

      Chief Product Officer, 1Password

  13. The Huge Threat Posed by Increased Targeting of Cloud Services

    Netskope's Paolo Passeri explains how cyber espionage and cybercrime operations are targeting cloud services

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  14. How to Recover MS SQL Database from Suspect Mode

    Understand why a SQL database might enter "suspect mode," where it's unavailable due to a failed recovery process, and how to fix it

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  15. How To Bridge the Access Management Gap in Your Business’ Security Strategy

    In the age of SaaS, extended access management offers a solution to secure all applications and devices, mitigating the risks associated with unmanaged software

    1. Photo of Steve Won

      Steve Won

      Chief Product Officer, 1Password

  16. Exploring SaaS Security with DORA

    The EU's Digital Operational Resilience Act, implemented to fortify financial institutions against cyberattacks, requires compliance by January 2025 with hefty potential fines for non-adherence

    1. Photo of Hananel Livneh

      Hananel Livneh

      Head of Product Marketing, Adaptive Shield

  17. Hardened Ubuntu Container Images are Now Available in the Iron Bank

    US government agencies can now access secure, pre-configured Ubuntu container images through the US Air Force's Iron Bank platform

    1. Photo of Devin Breen

      Devin Breen

      Director of Federal, Canonical

  18. IT Leaders Agree: SSO Isn’t Enough

    Security professionals have turned to single sign-on (SSO) to help secure all of their apps, but it’s becoming increasingly clear that SSO isn’t enough. Businesses need a complete approach to secure identity, devices, and applications

    1. Photo of Steve Won

      Steve Won

      Chief Product Officer, 1Password

  19. The Zero Trust Security Gap No One Talks About and How to Fill It

    Today, many employees can work from anywhere, and use personal devices to get their work done. But this new way of working is exposing businesses to unseen risks. Companies must adjust their security approach and move away from legacy solutions to keep their organizations safe from unseen and unmanaged threats

    1. Photo of Steve Won

      Steve Won

      Chief Product Officer, 1Password

  20. Battling the Malware Onslaught

    Delving into the pervasive nature of malware attacks, this article highlights the unique challenges encountered by sectors such as finance and government

    1. Photo of Daniel Feaver

      Daniel Feaver

      Cybersecurity Solutions Engineer, Everfox

What’s hot on Infosecurity Magazine?