Infosecurity Blogs

  1. Nine Steps to Cybersecurity

    What needs to be secured, why and how to rise to the challenge

    1. Photo of Dagmara Skomra

      Dagmara Skomra

      Product Manager, Comarch

  2. Let’s Not Wait for Crises Before Prioritizing Safeguards for AI

    Just because AI provides the capability to do something does not mean it should be done

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  3. Using the Cloud: Seven Top Security Threats to Know About

    How to ensure security in the cloud

    1. Photo of Dagmara Skomra

      Dagmara Skomra

      Product Manager, Comarch

  4. Security by Sector: Synopsys and Finastra Partner to Secure Financial Services App Ecosystem

    Financial services sector gets a boost of app security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. Why the Travelex Incident Portends the Changing Nature of Ransomware

    It’s no longer simplistic ransomware, but bigfish extortion

    1. Photo of Mark Sangster

      Mark Sangster

      VP and Industry Security Strategist, eSentire

  6. Sustaining Security Talent: A Big Challenge for CISOs

    Security engineers are hard to come by

    1. Photo of Charlie  Eriksen

      Charlie Eriksen

      CTO, Adversary

  7. Big Data, Big Risks: Addressing the High-Tech & Telecoms Threat Landscape

    Addressing the high-tech and telecoms threat landscape

  8. Security by Sector: Healthcare Orgs Continue to Suffer Security Headaches

    Healthcare industry still having a torrid time when it comes to information security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  9. The Helpful Hack That Started It All

    Attacks can be devastating, but can also provide unexpected silver linings in the form of increased security and safer communication

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  10. Setting the Stage for Innovation at #RSAC 2020

    Some of the Innovation Programs attendees can look forward to this year

  11. How to Prevent Your Business From Being Hacked

    All businesses consider the risks of having weak password controls and the effects of password spraying

    1. Photo of Jason Hart

      Jason Hart

      CTO EMEA, Rapid7

  12. Security by Sector: Travel and Hospitality Industries Extend Security-Sharing Community

    Travel & Hospitality ISAC becomes part of Retail & Hospitality ISAC to strengthen cybersecurity in travel and hospitality sectors

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. Managing Customer Identity in the Era of CCPA

    It has most been a confusing and often stressful process for privacy, legal, and risk teams to track.

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  14. How 2019’s Worst Corporate Hacks Could Have Been Prevented

    The majority of breaches can be avoided

    1. Photo of István Molnár

      István Molnár

      Security & Compliance Specialist, Tresorit

  15. The Seven Real Security Predictions

    Ways to help you navigate the next decade of cybersecurity threats as we enter 2020.

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  16. Bringing the Human Element to Life at #RSAC 2020

    While industry leaders are busy reflecting on the events of 2019 and thinking about what is to come for 2020, the RSA Conference team is firming up a rock-solid agenda.

  17. 2020 Trends: Less is More in Security

    To secure an organization, security tools must be made more resilient and the structure more transparent

    1. Photo of Dagmara Skomra

      Dagmara Skomra

      Product Manager, Comarch

  18. Making the Case for Physical Security

    ISO 27001 certification is a viable solution to mitigate all information security risk

  19. Year in Review: Malware and Ransomware

    As these attacks become more targeted, information and intelligence sharing between organizations as well as automation and machine learning is critical

    1. Photo of Derek Manky

      Derek Manky

      Chief Security Strategist & VP Global Threat Intelligence, FortiGuard Labs

  20. Year in Review: Cloud Security

    Five New Year's Resolutions for Cloud Security

    1. Photo of Mike Campfield

      Mike Campfield

      VP, GM of International and Global Security Programs, Extrahop

What’s hot on Infosecurity Magazine?