Infosecurity Blogs

  1. A Prequel to Ransomware

    How should orgs react to ransomware incidents?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  2. Misconfigurations are the Biggest Threat to Cloud Security: Here's What to Do

    Four ways to protect against cloud security misconfigurations, the biggest threat to cloud security

    1. Photo of Greg Young

      Greg Young

      Vice President for Cybersecurity, Trend Micro

  3. Why are Companies Still Struggling to Support Safe Remote Working?

    Remote workers continue to pose a major threat to data security, more than a year after the office exodus that caught many companies off guard. Jon Fielding investigates

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  4. The Digital Training Revolution and Mass Mandatory ‘Modulation’

    The effectiveness of digital training is greatly improved with appropriate supervision and leadership

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  5. Top 5 Attacks in Commonly Used SaaS Apps

    One of the most prevalent places for a company leak or breach has to do with misconfigurations found in an organization's SaaS apps. Here are five examples from real-world attacks.

    1. Photo of Maor  Bin

      Maor Bin

      CEO & Co-Founder, Adaptive Shield

  6. The Expanding Scope and Complexity of Credentials Phishing

    How should orgs combat the rise in credential phishing attacks?

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  7. Security in the Cloud: Where Your Responsibility Begins and the Cloud Provider's Ends

    Cloud computing has revolutionized the IT world, so resources in the cloud must be safer, right? Wrong.

    1. Security Researcher

      Trend Micro

  8. Overcoming The Challenges of Emerging Technology

    How can security pros stay informed about emerging technologies?

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  9. The Dystopic Future of Cybersecurity and the Importance of Empowering CISOs

    Vanessa Pegueros explores the importance of empowering CISOs facing the ever-traumatizing threats of cybercrime

    1. Photo of Vanessa  Pegueros

      Vanessa Pegueros

      Chief Trust & Security Officer, OneLogin

  10. CISO Stories: Part Two

    This is the story of Boris, CISO at an international charity

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  11. Misconfigurations are Mistakes: Eliminate the Biggest Vulnerability in Cloud Services

    Mark Nunnikhoven argues that organizations should be pushing to move faster to the cloud in order to improve their security

    1. Security Researcher

      Trend Micro

  12. Time for Infosec Professionals’ Imaginations to Stretch to Outer Space

    Cybersecurity must be at the heart of the development of the space sector

    1. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

  13. Six Ways to Improve Your Cyber-Resilience to Combat Cyber-Attacks

    Six tips for improving your company's cyber-resilience to combat cyber-attacks in 2021

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  14. The Benefits of Unified Physical Security Systems

    Unified security systems can greatly enhance business operations

    1. Photo of Anthonie van der Ploeg

      Anthonie van der Ploeg

      Sales Director Benelux & Nordics, Genetec

  15. The Risk of Collaboration Apps

    How have cyber-criminals exploited the rise in collaboration apps, and what can orgs do about it?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  16. How Hackers Use Cloud Services to Make Cybercrime More Profitable

    Cloud services can optimize resources, save time, increase automation, and take some of the security responsibility off of an organization’s plate.

    1. Photo of Bob McArdle

      Bob McArdle

      Director FTR - Cybercrime Research, Trend Micro

  17. The Five Strategies Users Use to Determine Phishing: Which Work and Which Don’t?

    Verizon estimates that 90% of all data breaches originate from phishing and according to the Anti Phishing Working Group, the number of phishing websites are at an all-time high right now.

    1. Photo of Robert  Lagerström

      Robert Lagerström

      Associate Professor, KTH Royal Institute of Technology & Founder, Foreseeti

  18. A Story of Human Error and Revenge

    Organizations must understand how employee stress can lead to cybersecurity errors

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  19. Too Much Trust?

    Have security pros been too relaxed about cyber-threats during the pandemic?

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  20. Addressing Burn Out in Cybersecurity Teams

    With cyber-threats increasing rapidly, what steps can be taken to help avoid burn out in security teams?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

What’s hot on Infosecurity Magazine?