Infosecurity Blogs

  1. Cloud Services Are Top-of-Mind for Phishers

    The growth in cloud adoption is changing the phishing landscape

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  2. DDoS Ransom Attacks: What You Need to Know

    Adverse impacts of a ransom attack can be curbed if dealt with swiftly

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  3. Premier League Teams Train Together in Defense Against Cyber-Attacks

    The English Premier League is a high-value target for would-be cyber-attackers

    1. Photo of John Ward

      John Ward

      Cybersecurity Writer, Specops Software – An Outpost24 Company

  4. Security by Design Implementation Insights

    How can orgs implement a successful security-by-design strategy

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  5. Healthcare Carries a Large Target for Ransomware

    How can healthcare orgs protect themselves from the threat of ransomware?

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  6. CISO Stories: Part One

    Part one of Nadine Michaelides’ CISO Stories series tells the tale of a CISO working in the chemical industry

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  7. The Future of Crypto and Casinos

    Cyptocurrencies find their way into many industries as secure payment options, including gambling

    1. Photo of Isa Aliu

      Isa Aliu

      Content writer

  8. Zero Trust in the Post-Pandemic Era

    Security concepts like Zero Trust represent what we need to strive for in the post-pandemic era

    1. Photo of Tony Howlett

      Tony Howlett

      CISO, SecureLink

  9. Global Focus on Supply Chain Security Has Transformational Impacts for SMBs

    How should small businesses look to develop their security in the current landscape?

    1. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

  10. Social Engineering and the IT Service Desk

    The pandemic has provided a perfect opportunity for many types of social engineering attacks

    1. Photo of Liz Rivera

      Liz Rivera

      Senior Product Marketing Manager, Specops Software

  11. ISO 27701: A Pathway to Privacy and Regulatory Compliance

    Answers to some commonly asked questions regarding ISO 27701

    1. Photo of Joyce van Luijn-Bonneveld

      Joyce van Luijn-Bonneveld

      Sr. Lead Auditor, Information & Cyber Security, Lloyd's Register

  12. Cybercrime to Scale New Heights in 2021: What Can You do About it?

    How can organizations respond to emerging threats effectively?

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  13. How Cloud Services Are Exploited for Cyber-Espionage

    A number of recent cyber-espionage campaigns share common characteristics

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  14. Excluding Words Using Active Directory Password Policy

    Why an administrator might choose to exclude words from passwords, and how they may do so

    1. Photo of Tyler  Charboneau

      Tyler Charboneau

      Cybersecurity Expert & Technology Enthusiast

  15. Cybersecurity in 2021: People, Process and Technology to Integrate More Than Ever Before

    What are the main security issues for the year ahead?

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  16. New Year, New Cybersecurity Concerns: A Look at 2021’s Top Trends

    A look at some key cybersecurity themes for 2021

    1. Photo of Mike Wilson

      Mike Wilson

      Founder & CTO, Enzoic

  17. Your New Tools and Policies Won’t Save You

    As technology advances, we should not lose sight of the importance of the human component of cybersecurity

    1. Photo of Donald Lodge

      Donald Lodge

      Compliance Officer

    2. Photo of Elissa McKinley

      Elissa McKinley

      Information Security Risk Manager

  18. Five Key Cybersecurity Themes from 2020

    What were the biggest cybersecurity trends seen in 2020?

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  19. Taking the First Steps Toward Self-Repairing Endpoints

    How close are we to self-repairing endpoints?

    1. Photo of Candid  Wüest

      Candid Wüest

      VP of Cyber Protection Research, Acronis

  20. Corporate Endpoint Security: How to Protect Yourself from Fileless Threats and Detect Insiders

    Even with an endpoint solution, there is likely to be gaps that can and should be closed

    1. Photo of Oleg  Zaitsev

      Oleg Zaitsev

      Security Expert, Anti-Malware Technologies Development, Kaspersky

What’s hot on Infosecurity Magazine?