Infosecurity Blogs
Improving Cyber-Risk Management with ISO 27001 and the 10 Steps to Cybersecurity
How the ‘10 steps to cybersecurity’ map with requirements of ISO 27001
Why Physical Data Destruction is Absolutely Vital
Many people neglect to take proper physical destruction into consideration
Virgin Media Data Breach: What Can Customers Do?
The failings that enabled the Virgin Media breach, and what options are open to consumers
Where the Cyberspace Solarium Commission Report Succeeded and Could Improve
The report moves the governments defense of civilization into modern times, but I feel we can do more
Best Practices in Designing a Data Decommissioning Policy
Ensure a proper decommissioning plan to minimize your organization’s chances of falling victim to a breach
Growing VPN Exploitation Is Cause For Concern
Attacks are often web application attacks abusing the web frontend that has been extended from VPNs
Security by Sector: NHS Digital and Egress Partner to Strengthen Healthcare Email Processes
Move will improve user experience and security in NHSmail
Linux Kernel Live Patching: What It Is and Who Needs It
A background of live patching and the advantages of using it
Coronavirus and the Cybersecurity Threat Landscape
Organizations who survive the fallout will be those that understand how to isolate and insulate their core operations and services.
Security by Sector: 148% Increase in Cyber-Attacks on The Pensions Regulator in 2019
Email attacks on the pensions sector are on the rise
Women in Cybersecurity Keynote: Bobbie Stempfley Shares Invaluable Career Advice
Bobbie Stempfley delivered an inspirational keynote presentation at the Infosecurity Magazine Women in Cybersecurity networking breakfast event in San Francisco
Meeting SOC 2 Compliance With Your Own Products
Getting SOC 2 compliance is tough, keeping it is tougher
Why Our Infosecurity Women in Cybersecurity Networking Event Isn’t About Women in Cybersecurity
Infosecurity is preparing for it's fourth women in cybersecurity networking event – the first to be run Stateside
Security by Sector: Medical IoT Gets Much Needed Dose of Cybersecurity
Connected healthcare devices are a serious security risk, but a new virtual segmentation capability seeks to boost medical IoT
Combatting Coronavirus Phishing and Malware Attacks
As the virus becomes more widespread, we’re likely to see similar tactics used
The Calm After the Storm
How to start your preparation as part of the “lessons learned” of an incident
Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry
AI, 5G and Blockchain considered important investments for improving quality of credit data and decision-making
PCI Compliance: Not a Password Security Guarantee
How to exceed PCI password requirements to become more secure
Ryuk: Defending Against This Increasingly Busy Ransomware Family
The incident at the MTSA-regulated facility is just one of the latest attacks to involve Ryuk.
Security by Sector: Cyber-Attack Could Create Financial Crisis, Says ECB Chief
European Central Bank’s president highlights potential impact of cyber-attacks on banks