Infosecurity Blogs

  1. Building a Security Testing Plan

    Testing the effectiveness of your controls is imperative to knowing your true security posture

    1. Photo of Eyal  Wachsman

      Eyal Wachsman

      CEO and Co-Founder, Cymulate

  2. Why Diversity In Security Teams Can Give Organizations An Edge Over Cyber-criminals

    As threats become more diverse, so must the teams we put in place to defend against them

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  3. Security by Sector: FireEye and Claroty Team Up to Simplify ICS/OT Threat Detection and Response

    Firms announce platform integration to bolster security of industrial and operational control processes

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  4. Technical Controls to Mitigate Security Risk

    The technical controls to minimize risk have been largely under-reported

    1. Photo of Mike Klepper

      Mike Klepper

      National Practice Director for Application Security, Threat & Vulnerability Management, AT&T Cybersecurity

  5. How Can Cyber Startups Win Customers and Influence CISOs?

    How new businesses can succeed in selling cyber

    1. Photo of Grace Cassy

      Grace Cassy

      Co-Founder, CyLon

  6. Security by Sector: Cyber-Criminals Seek to Exploit Automotive Manufacturing

    New report highlights cyber-threats facing manufacturers in the automotive industry

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  7. Nudging Towards a Secure World

    Nudges are not mandates.

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  8. Are Pwned Passwords Putting Your Business at Risk?

    There are still bad password habits prevalent in many organizations today

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  9. Security by Sector: Study Explores Cyber-Threats Impacting the Utility Industry

    54% of respondents expect attack on critical infrastructure in next 12 months

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. Is Your Enterprise Cyber Risk Managed Well?

    The objective for risk management is not necessarily to fix the problem, the objective is to find the most efficient way to manage it

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  11. Signal From Noise: How to Win Customers and Influence CISOs

    What are CISOs looking for in new products?

    1. Photo of Grace Cassy

      Grace Cassy

      Co-Founder, CyLon

  12. Security by Sector: Two in Five Real Estate Pros Say Industry is Unprepared for Cyber-Attacks

    New research highlights cybersecurity risks and concerns within the real estate sector

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. FBI: Israel Used StingRays to Spy on the US

    Cellphone surveillance isn't just a problem for Presidents to worry about

    1. Photo of Marx Maxwell

      Marx Maxwell

      Freelance Writer

  14. Security by Sector: Bad Bots Targeting the E-Commerce Industry

    Research finds e-commerce bot activity is becoming more sophisticated and harder to detect

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  15. Security Awareness for the Masses

    From an attacker perspective, there are three broad areas of attack

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  16. Security by Sector: Cybercrime Could Impact the Food Processing and Manufacturing Industry

    New research report highlights potential cybersecurity risks facing the food sector

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  17. No Matter Your Perspective on Cybersecurity, Need for SecDevOps is Evident

    The global appreciation of SecDevOps is rather obvious when examining cybersecurity holistically

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  18. Security by Sector: Charity Workers Least Likely to Receive Email Security Training

    Only 11% of charity workers receive regular training on email security risks

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  19. Security by Sector: Jaguar Land Rover & BlackBerry Seek to Improve Security in Manufacturing of Next-Gen Vehicles

    Brands announce deepened partnership to focus on security and safety of intelligent vehicles

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  20. NIS Directive: One Year On – Has it Been Enough?

    A year on, has the NIS directive achieved its aims?

    1. Photo of Gavin Millard

      Gavin Millard

      Technical Director, Tenable

What’s hot on Infosecurity Magazine?