Infosecurity Blogs

  1. Improving Cyber-Risk Management with ISO 27001 and the 10 Steps to Cybersecurity

    How the ‘10 steps to cybersecurity’ map with requirements of ISO 27001

  2. Why Physical Data Destruction is Absolutely Vital

    Many people neglect to take proper physical destruction into consideration

    1. Photo of Flora Knolton

      Flora Knolton

      Sales & Marketing Associate, Security Engineered Machinery

  3. Virgin Media Data Breach: What Can Customers Do?

    The failings that enabled the Virgin Media breach, and what options are open to consumers

    1. Photo of Aman Johal

      Aman Johal

      Director and lawyer at Your Lawyers

  4. Where the Cyberspace Solarium Commission Report Succeeded and Could Improve

    The report moves the governments defense of civilization into modern times, but I feel we can do more

    1. Photo of Chris Grove

      Chris Grove

      Technology Evangelist, Nozomi Networks

  5. Best Practices in Designing a Data Decommissioning Policy

    Ensure a proper decommissioning plan to minimize your organization’s chances of falling victim to a breach

    1. Photo of Heidi  Parthena White

      Heidi Parthena White

      Director of Marketing, Security Engineered Machinery, SEM

  6. Growing VPN Exploitation Is Cause For Concern

    Attacks are often web application attacks abusing the web frontend that has been extended from VPNs

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  7. Security by Sector: NHS Digital and Egress Partner to Strengthen Healthcare Email Processes

    Move will improve user experience and security in NHSmail

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  8. Linux Kernel Live Patching: What It Is and Who Needs It

    A background of live patching and the advantages of using it

    1. Mikhail Pobirskiy

      Product Manager, KernelCare

  9. Coronavirus and the Cybersecurity Threat Landscape

    Organizations who survive the fallout will be those that understand how to isolate and insulate their core operations and services.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  10. Security by Sector: 148% Increase in Cyber-Attacks on The Pensions Regulator in 2019

    Email attacks on the pensions sector are on the rise

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  11. Women in Cybersecurity Keynote: Bobbie Stempfley Shares Invaluable Career Advice

    Bobbie Stempfley delivered an inspirational keynote presentation at the Infosecurity Magazine Women in Cybersecurity networking breakfast event in San Francisco

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  12. Meeting SOC 2 Compliance With Your Own Products

    Getting SOC 2 compliance is tough, keeping it is tougher

    1. Leonid Kanter

      IT Director, CloudLinux.

  13. Why Our Infosecurity Women in Cybersecurity Networking Event Isn’t About Women in Cybersecurity

    Infosecurity is preparing for it's fourth women in cybersecurity networking event – the first to be run Stateside

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  14. Security by Sector: Medical IoT Gets Much Needed Dose of Cybersecurity

    Connected healthcare devices are a serious security risk, but a new virtual segmentation capability seeks to boost medical IoT

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  15. Combatting Coronavirus Phishing and Malware Attacks

    As the virus becomes more widespread, we’re likely to see similar tactics used

    1. Photo of Will LaSala

      Will LaSala

      Senior Director of Global Solutions, OneSpan

  16. The Calm After the Storm

    How to start your preparation as part of the “lessons learned” of an incident

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  17. Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

    AI, 5G and Blockchain considered important investments for improving quality of credit data and decision-making

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. PCI Compliance: Not a Password Security Guarantee

    How to exceed PCI password requirements to become more secure

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  19. Ryuk: Defending Against This Increasingly Busy Ransomware Family

    The incident at the MTSA-regulated facility is just one of the latest attacks to involve Ryuk.

    1. Photo of Richard Henderson

      Richard Henderson

      Head of Global Threat Intelligence, Lastline

  20. Security by Sector: Cyber-Attack Could Create Financial Crisis, Says ECB Chief

    European Central Bank’s president highlights potential impact of cyber-attacks on banks

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?