Infosecurity Blogs

  1. Ransomware: To Pay or Not to Pay?

    Ransomware is an increasingly prevalent threat to small and medium-size business, but when is it right to pay a ransom?

    1. Photo of Kris Schulze

      Kris Schulze

      Disaster Recovery Advocate, Acronis

    2. Photo of James R. Slaby

      James R. Slaby

      Director, Cyber Protection, Acronis

  2. Zero Days and Patch Lag: Stemming the Software Pandemic

    Chrome has become the increasing subject of Zero Day Exploits owing to the unavoidable problem of patch lag

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  3. The Story of the EC-Council Gender Survey Scandal: Survey Creator Says "It Was Written by Women so it Can't be Sexist"

    On Friday 09 April, EC-Council pushed out a ‘women in security’ survey poll on LinkedIn with three abhorrently sexist answer options. Eleanor Dallaway investigates…

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  4. How Security Culture Invokes Secure Behavior

    Orgs should take steps to improve their security culture now

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  5. How SASE is Key to 5G Security Success

    With the SASE model, orgs will have the opportunity to offer more secure 5G networks

    1. Photo of Amit Bareket

      Amit Bareket

      CEO and Co-Founder, Perimeter 81

  6. Questions Enterprises Should Be Asking as they Migrate to the Cloud

    What steps should orgs take to ensure a secure move to the cloud?

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  7. Risk Management Program Development 101

    What are the steps orgs need to take to develop a successful risk management program?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  8. Blurring Boundaries: Keeping ‘Consumer’ Scams Out of the Business Environment

    Every business should act now to safeguard themselves and mitigate the impact of an attack

    1. Photo of Jon Fielding

      Jon Fielding

      Managing Director EMEA, Apricorn

  9. Who Should Own Third Party Risk Management?

    TPRM’s role in keeping orgs safe from cyber-attacks creates differing opinions on where it should reside

    1. Photo of Tony Howlett

      Tony Howlett

      CISO, SecureLink

  10. #COVID19, Password Spraying and the NHS

    How password spraying risks threatens the NHS

    1. Photo of Sophie Porter

      Sophie Porter

      Health Tech Writer

  11. Why Employee Cyber-Awareness is Critical Every Day, Not Just During a Crisis

    Organizations need to ensure their awareness programs are relevant and targeted

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  12. Why Quantum Computers Pose a Very Real Risk to Cybersecurity

    The quantum threat, why it matters and why addressing it cannot wait

    1. Photo of Dr Ali  El Kaafarani

      Dr Ali El Kaafarani

      Founder and CEO, PQShield

  13. Cybersecurity Survivorship Bias and How to Avoid it

    Why orgs should avoid falling into survivorship bias

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  14. Password Security for Furloughed Employees

    Companies must continue to consider cybersecurity regarding furloughed employees

    1. Photo of Brandon Lee

      Brandon Lee

      Technology Writer

  15. Cloud Services Are Top-of-Mind for Phishers

    The growth in cloud adoption is changing the phishing landscape

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  16. DDoS Ransom Attacks: What You Need to Know

    Adverse impacts of a ransom attack can be curbed if dealt with swiftly

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  17. Premier League Teams Train Together in Defense Against Cyber-Attacks

    The English Premier League is a high-value target for would-be cyber-attackers

    1. Photo of John Ward

      John Ward

      Cybersecurity Writer, Specops Software – An Outpost24 Company

  18. Security by Design Implementation Insights

    How can orgs implement a successful security-by-design strategy

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  19. Healthcare Carries a Large Target for Ransomware

    How can healthcare orgs protect themselves from the threat of ransomware?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  20. CISO Stories: Part One

    Part one of Nadine Michaelides’ CISO Stories series tells the tale of a CISO working in the chemical industry

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

What’s hot on Infosecurity Magazine?