Infosecurity Blogs

  1. Major Lessons to be Learned from 2020 Security Mishaps

    Attacks have caused damage and presented several key lessons moving forward

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  2. Securing IT During the Pandemic: Report Reveals Cyber-Readiness Challenges

    Organizations must focus on strategies and solutions that are highly adaptable, integrated and proactively protective

  3. How COVID-19 Forced Forex Software Providers to Improve Security

    Financial authorities have been warning forex traders about the heightened threat of security breaches

    1. Photo of Justin Grossbard

      Justin Grossbard

      Managing Director, Compare Forex Brokers

  4. ISO 27001: Recognizing the Importance of Operational Security

    Good operational security is crucial, but it’s not always appreciated and is often challenging to execute consistently

  5. Defending U.S. Voting Processes Now and into the Future

    2020 has created the perfect storm of challenges for the democratic process this year.

    1. Photo of Casey Ellis

      Casey Ellis

      Founder and CTO, Bugcrowd

  6. The Changing Cyber-Landscape and How Organizations Can Reduce the Risks

    IT teams need to adapt and become more agile to keep nefarious actors at bay

    1. Photo of Josh  Horwitz

      Josh Horwitz

      Chief Operating Officer, Enzoic

  7. Why 10,000 Years of Disinformation Will Not Suddenly Go Away

    Today misinformation can be spread in the blink of an eye (or the tap of a keystroke

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  8. COVID-19 and Cybersecurity Staffing Shortages

    Why staffing shortages are getting worse and how to address the issue

    1. Photo of Emma  Brighton

      Emma Brighton

      Content Strategist

  9. Time to Pardon Edward Snowden?

    Edward Snowden, in the end, did the right thing by notifying the public of illegal privacy violations, and it’s time he came home

    1. Photo of Dan Arel

      Dan Arel

      Startpage Consultant

  10. Three Reasons Why Password Self-Service Enrollment Fails, and What to Do About it!

    Password self-service enrollment needs to be a process that is intuitive, simple and non-invasive

    1. Photo of Nick Cavalancia

      Nick Cavalancia

      Microsoft Cloud and Datacenter MVP

  11. Repairing SQL Database Corruption with CHECKDB Repair? You Can Lose Your Data Forever

    An enterprise database repair tool can plug gaps in your SQL database maintenance and restoration strategy

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  12. Credential Stuffing: the Culprit of Recent Attacks

    Credential stuffing attacks use stolen usernames and password combinations

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  13. IR Planning – It Is Not Optional!

    Understanding what to do when an incident occurs and who to talk to is critical to ensuring there is an effective response

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  14. Double Extortion Ransomware Attacks and the Role of Vulnerable Internet-Facing Systems

    Ransomware attacks are adopting an approach defined as “double extortion"

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  15. Cyberwarfare: the New Frontier of Wars Between Countries

    Cyberwarfare can be launched instantly, making it difficult to counter

    1. Photo of Vinugayathri  Chinnasamy

      Vinugayathri Chinnasamy

      Senior Content Writer, Indusface

  16. A New Path for Data Protection

    Any organization that is dealing with large amounts of unstructured data should strongly consider microsharding

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  17. Using Self-Service Password Reset Tools to Support Remote Workers

    Password resets have always been problematic for helpdesks

    1. Photo of Brien  Posey

      Brien Posey

      Technology Author and Speaker, 18-time Microsoft MVP

  18. Focus on Continuous Learning, Not Passing Exams

    Continuous learning is done by teaching humans to think for themselves and be creative

    1. Photo of Max  Vetter

      Max Vetter

      Chief Cyber Officer, Immersive Labs

  19. Stop the Cyber-Attack Cycle with Privileged Access Management

    Securing privileged access helps shrink the attack surface

    1. Lavi Lazarovitz

      Head of Security Research, CyberArk

  20. Is the Security Department a Barrier for Progression or are they Misunderstood?

    Is the security team, "The Department of No?"

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

What’s hot on Infosecurity Magazine?