Infosecurity Blogs
A Prequel to Ransomware
How should orgs react to ransomware incidents?
Misconfigurations are the Biggest Threat to Cloud Security: Here's What to Do
Four ways to protect against cloud security misconfigurations, the biggest threat to cloud security
Why are Companies Still Struggling to Support Safe Remote Working?
Remote workers continue to pose a major threat to data security, more than a year after the office exodus that caught many companies off guard. Jon Fielding investigates
The Digital Training Revolution and Mass Mandatory ‘Modulation’
The effectiveness of digital training is greatly improved with appropriate supervision and leadership
Top 5 Attacks in Commonly Used SaaS Apps
One of the most prevalent places for a company leak or breach has to do with misconfigurations found in an organization's SaaS apps. Here are five examples from real-world attacks.
The Expanding Scope and Complexity of Credentials Phishing
How should orgs combat the rise in credential phishing attacks?
Security in the Cloud: Where Your Responsibility Begins and the Cloud Provider's Ends
Cloud computing has revolutionized the IT world, so resources in the cloud must be safer, right? Wrong.
Overcoming The Challenges of Emerging Technology
How can security pros stay informed about emerging technologies?
The Dystopic Future of Cybersecurity and the Importance of Empowering CISOs
Vanessa Pegueros explores the importance of empowering CISOs facing the ever-traumatizing threats of cybercrime
CISO Stories: Part Two
This is the story of Boris, CISO at an international charity
Misconfigurations are Mistakes: Eliminate the Biggest Vulnerability in Cloud Services
Mark Nunnikhoven argues that organizations should be pushing to move faster to the cloud in order to improve their security
Time for Infosec Professionals’ Imaginations to Stretch to Outer Space
Cybersecurity must be at the heart of the development of the space sector
Six Ways to Improve Your Cyber-Resilience to Combat Cyber-Attacks
Six tips for improving your company's cyber-resilience to combat cyber-attacks in 2021
The Benefits of Unified Physical Security Systems
Unified security systems can greatly enhance business operations
The Risk of Collaboration Apps
How have cyber-criminals exploited the rise in collaboration apps, and what can orgs do about it?
How Hackers Use Cloud Services to Make Cybercrime More Profitable
Cloud services can optimize resources, save time, increase automation, and take some of the security responsibility off of an organization’s plate.
The Five Strategies Users Use to Determine Phishing: Which Work and Which Don’t?
Verizon estimates that 90% of all data breaches originate from phishing and according to the Anti Phishing Working Group, the number of phishing websites are at an all-time high right now.
A Story of Human Error and Revenge
Organizations must understand how employee stress can lead to cybersecurity errors
Too Much Trust?
Have security pros been too relaxed about cyber-threats during the pandemic?
Addressing Burn Out in Cybersecurity Teams
With cyber-threats increasing rapidly, what steps can be taken to help avoid burn out in security teams?