Infosecurity Blogs

  1. The Dangers of Running an Unsupported OS

    Running an unsupported OS leaves servers open to problems and attacks

    1. Alexander Vinogradov

      Product Manager, CloudLinux OS

  2. The Ticking Timebomb: Data Breaches from Hardware End-of-Life

    An often-overlooked area of cybersecurity leaves organizations susceptible to data breaches: hardware end-of-life

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  3. Evolving Web Application Supply Chain Threats

    Attention is being turned to the supply chain that makes up modern web applications.

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  4. Cybercrime is Winning – What Are You Going to Do About It?

    Turning the tide in the ongoing battle with cyber-criminals

    1. Photo of Chris Dale

      Chris Dale

      Principal Consultant, River Security and Certified SANS Instructor

  5. A Country in Crisis: Data Privacy in the US

    In today’s data-driven environment, it seems not a day goes by without hearing of a data breach or leak

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  6. Timely Opportunities Exist to Address Longstanding Security Gaps

    Could the other side of the pandemic see green shoots of a skills shortage resolution?

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  7. How to Check for Breached Passwords in Active Directory

    It’s never been more important to check for leaked passwords in Active Directory

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  8. Huawei CSO: Secure Networks Do Not Trust Anyone

    If the U.S. government wants to forgo a comprehensive approach to risk management and simply seek alternatives to Huawei, it has several options

    1. Photo of Andy Purdy

      Andy Purdy

      CSO, Huawei

  9. Who is Responsible for End-of-Life Data Destruction?

    End-of-life data destruction should not be an additional responsibility heaped on an IT team

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  10. Security by Sector: Insecure Data Sharing Practices Putting Educational Orgs at Risk

    Survey finds 82% of educational organizations do not track data sharing at all or do it manually

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  11. Cloud-Native Threats in the COVID-19 Pandemic

    Shadow traffic poses a serious risk as it isn’t inspected and creates a gate to corporate resources.

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  12. Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’

    No one handling sensitive data should become complacent or take a lax approach to the security of sensitive data

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  13. Security by Sector: Online Banking Resource Center Launched to Fight #COVID19 Fraud

    Free service allows users to check whether COVID-19 emails, SMS messages and social posts are banking scams

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  14. Click Here to Find Out Who Falls for Scams

    What persuaded you to click was most likely some form of social proof.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  15. Why Data Centers Need Formal Data End-of-Life Processes

    Data centers are at the heart of both the problem and solution regarding sensitive data storage

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  16. Security by Sector: Over a Third of Consumers Don’t Trust Digital Comms from Banks

    New survey highlights trust issues surrounding banking-related digital communications

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  17. Implementing Effective Remote Incident Response in a Pandemic

    Whilst workforces are remote, it becomes harder to dispatch traditional Digital Forensics and Incident Response teams to client sites

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  18. Data Security and Decommissioning in a 5G and Streaming World

    For businesses that store and handle data, 5G transition will present costly security risk challenges

    1. Photo of Paul Falcone

      Paul Falcone

      Marketing Coordinator, SEM

  19. Working from Home During #COVID19: Increasing Threats

    Cyber-criminals will always try to capitalize on any significant events happening in the world

  20. Remote Workforces: Security Challenges Amid #COVID19

    Common challenges organizations are facing as they transition their workforce

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

What’s hot on Infosecurity Magazine?