Infosecurity Blogs

  1. How it Works: Machine Learning Against Email Phishing

    Phishing remains one of the most fraudulent tricks that can be found in malicious email traffic

    1. Photo of Nikita  Benkovich

      Nikita Benkovich

      Senior Data Scientist, Anti-Spam Technologies Development, Kaspersky

  2. Achieving Complete Control Across Your SaaS Applications: Is it Possible?

    Today, organizations rely on SaaS platforms for just about everything

    1. Photo of Maor  Bin

      Maor Bin

      CEO & Co-Founder, Adaptive Shield

  3. For Most Companies, Securing Remote Work is Unfinished Business

    To secure their companies’ ability to work remotely, many IT teams are expediting their move to the cloud and SaaS applications

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  4. How Incident Response Teams Survived COVID-19

    An overview of the incident response trends seen during this year's pandemic

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  5. Email Attacks on the Retail Industry: ‘Tis the Season

    UK retailers are not fully prepared and are not adequately protecting customers

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  6. Can Cyber Hygiene Lead to a Cyber Secure Attitude?

    If more people are cyber hygienic than not, then a positive cybersecurity culture emerges

    1. Photo of Nadine Michaelides

      Nadine Michaelides

      Cyber Psychologist & Founder, Anima

  7. The Value of a Compromised Cloud Account

    A compromised Office 365 account is a coveted target for malicious actors

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  8. Solving the Global Cybersecurity Skills Gap in Two Simple Steps

    How to address the global cybersecurity skills shortage

    1. Photo of Andrej Kovacevic

      Andrej Kovacevic

      Marketing Manager, Amebae Online

  9. Five Emerging Cyber-Threats to Watch Out for in 2021

    The five trends that will dominate the cybersecurity landscape in 2021

    1. Photo of Candid  Wüest

      Candid Wüest

      VP of Cyber Protection Research, Acronis

  10. Are Rogue Insiders an Excuse, Symptom or Root Cause?

    We need to look at the security controls that should identify and defeat rogue insiders

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  11. How Cyber-Criminals 'Get in the Game' and What it Means to Defend Against Them

    How do cyber-criminals become criminals?

    1. Photo of Kacey Clark

      Kacey Clark

      Security Researcher, Digital Shadows

  12. Disinformation and the CISO

    Fighting disinformation may be one of the biggest challenges that CISOs will face in the coming months and years #AADisinformation

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  13. How to Secure IT Efficiencies and Cost Savings in a Post-COVID World

    Common issues at the service desk and security gaps that can be resolved quickly

    1. Photo of Darren  James

      Darren James

      Senior Product Manager, Specops Software – An Outpost24 Company

  14. Supply Chain Cybersecurity: What You Need to Consider

    While supply chain cybersecurity can seem overwhelming, there are effective steps you can take

    1. Photo of Tommy  McDowell

      Tommy McDowell

      General Manager, Celerium

  15. Major Lessons to be Learned from 2020 Security Mishaps

    Attacks have caused damage and presented several key lessons moving forward

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  16. Securing IT During the Pandemic: Report Reveals Cyber-Readiness Challenges

    Organizations must focus on strategies and solutions that are highly adaptable, integrated and proactively protective

  17. How COVID-19 Forced Forex Software Providers to Improve Security

    Financial authorities have been warning forex traders about the heightened threat of security breaches

    1. Photo of Justin Grossbard

      Justin Grossbard

      Managing Director, Compare Forex Brokers

  18. ISO 27001: Recognizing the Importance of Operational Security

    Good operational security is crucial, but it’s not always appreciated and is often challenging to execute consistently

  19. Defending U.S. Voting Processes Now and into the Future

    2020 has created the perfect storm of challenges for the democratic process this year.

    1. Photo of Casey Ellis

      Casey Ellis

      Founder and CTO, Bugcrowd

  20. The Changing Cyber-Landscape and How Organizations Can Reduce the Risks

    IT teams need to adapt and become more agile to keep nefarious actors at bay

    1. Photo of Josh  Horwitz

      Josh Horwitz

      Chief Operating Officer, Enzoic

What’s hot on Infosecurity Magazine?