Infosecurity Blogs

  1. 2020 Trends: Less is More in Security

    To secure an organization, security tools must be made more resilient and the structure more transparent

    1. Photo of Dagmara Skomra

      Dagmara Skomra

      Product Manager, Comarch

  2. Making the Case for Physical Security

    ISO 27001 certification is a viable solution to mitigate all information security risk

  3. Year in Review: Malware and Ransomware

    As these attacks become more targeted, information and intelligence sharing between organizations as well as automation and machine learning is critical

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  4. Year in Review: Cloud Security

    Five New Year's Resolutions for Cloud Security

    1. Photo of Mike Campfield

      Mike Campfield

      VP, GM of International and Global Security Programs, Extrahop

  5. Year in Review: Social Engineering Attacks

    The better attackers understand their target, the more effective social engineering becomes

    1. Photo of Ryan Kalember

      Ryan Kalember

      SVP of Cybersecurity, Proofpoint

  6. Year in Review: Automation

    Using integration to take security automation from blunt object to surgical instrument

    1. Photo of Sri Sundaralingam

      Sri Sundaralingam

      Vice President of Product Marketing, Extrahop

  7. The Cybersecurity Doomsday Clock: What Time is it?

    There is no such thing as perfect security.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  8. Year in Review: Need for Better Security Effectiveness

    Incidents throughout the year demonstrated security’s key role in core business functions

    1. Photo of Robert Potter

      Robert Potter

      Chief Revenue Officer for Verodin

  9. Year in Review: Zero Trust

    Zero trust places emphasis on access and authentication management

    1. Photo of Matt Lock

      Matt Lock

      UK Technical Director, Varonis

  10. Security by Sector: Nozomi Networks Teams with IBM to Secure Industrial Infrastructure

    Firms seek to address global demand for converged OT and IT security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  11. Year in Review: DNS Security

    2019 saw the emergence of two new DNS security standards designed to make the internet safer for consumers and businesses alike

    1. Photo of Paul Adair

      Paul Adair

      Principal Product Manager, Infoblox

  12. Year in Review: Cybercrime

    A review of the cost and impact of cybercrime in 2019

    1. Photo of Carolyn Crandall

      Carolyn Crandall

      Chief Deception Officer and CMO, Attivo Networks

  13. Strategies to get ahead of an Incident

    What should organizations be doing to mitigate attacks and provide a way to respond when the worse happens?

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  14. Looking Back at Microsoft Ignite 2019 - Tech Intensity, End to End Security and AI

    Key notes from Microsoft Ignite 2019

    1. Photo of Stephen McCulloch

      Stephen McCulloch

      Lead Infrastructure Architect, Reed Exhibitions

  15. Year in Review: Security Awareness

    Aware, and beginning to care

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  16. Preparing For The 2019 Holiday Rush: Is Your Web Security Ready?

    It's the most wonderful time to perform final checks to ensure preparedness to withstand common attack vectors

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  17. Choosing the Right Cloud Provider: The Importance of Security Assessments

    Security assessments are important in making purchasing decisions

    1. Photo of István Molnár

      István Molnár

      Security & Compliance Specialist, Tresorit

  18. The Four New Pillars of Corporate Protection

    The fundamental pillars of the security world have started to change over the last few years

    1. Photo of Yair Solow

      Yair Solow

      CEO and Founder, CyGov

  19. Should You Trust Your Cloud Storage Provider?

    There are many misconceptions when it comes to how most file sync and sharing services handle business-critical information

    1. Photo of István Molnár

      István Molnár

      Security & Compliance Specialist, Tresorit

  20. Security by Sector: How Smartphone Biometric Risks Threaten the Banking Industry

    New research shows just how easy it is to bypass smartphone fingerprint tech

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?