Infosecurity Blogs

  1. Year in Review: Social Engineering Attacks

    The better attackers understand their target, the more effective social engineering becomes

    1. Photo of Ryan Kalember

      Ryan Kalember

      SVP of Cybersecurity, Proofpoint

  2. Year in Review: Automation

    Using integration to take security automation from blunt object to surgical instrument

    1. Photo of Sri Sundaralingam

      Sri Sundaralingam

      Vice President of Product Marketing, Extrahop

  3. The Cybersecurity Doomsday Clock: What Time is it?

    There is no such thing as perfect security.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  4. Year in Review: Need for Better Security Effectiveness

    Incidents throughout the year demonstrated security’s key role in core business functions

    1. Photo of Robert Potter

      Robert Potter

      Chief Revenue Officer for Verodin

  5. Year in Review: Zero Trust

    Zero trust places emphasis on access and authentication management

    1. Photo of Matt Lock

      Matt Lock

      UK Technical Director, Varonis

  6. Security by Sector: Nozomi Networks Teams with IBM to Secure Industrial Infrastructure

    Firms seek to address global demand for converged OT and IT security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  7. Year in Review: DNS Security

    2019 saw the emergence of two new DNS security standards designed to make the internet safer for consumers and businesses alike

    1. Photo of Paul Adair

      Paul Adair

      Principal Product Manager, Infoblox

  8. Year in Review: Cybercrime

    A review of the cost and impact of cybercrime in 2019

    1. Photo of Carolyn Crandall

      Carolyn Crandall

      Chief Deception Officer and CMO, Attivo Networks

  9. Strategies to get ahead of an Incident

    What should organizations be doing to mitigate attacks and provide a way to respond when the worse happens?

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  10. Looking Back at Microsoft Ignite 2019 - Tech Intensity, End to End Security and AI

    Key notes from Microsoft Ignite 2019

    1. Photo of Stephen McCulloch

      Stephen McCulloch

      Lead Infrastructure Architect, Reed Exhibitions

  11. Year in Review: Security Awareness

    Aware, and beginning to care

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  12. Preparing For The 2019 Holiday Rush: Is Your Web Security Ready?

    It's the most wonderful time to perform final checks to ensure preparedness to withstand common attack vectors

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  13. Choosing the Right Cloud Provider: The Importance of Security Assessments

    Security assessments are important in making purchasing decisions

    1. Photo of István Molnár

      István Molnár

      Security & Compliance Specialist, Tresorit

  14. The Four New Pillars of Corporate Protection

    The fundamental pillars of the security world have started to change over the last few years

    1. Photo of Yair Solow

      Yair Solow

      CEO and Founder, CyGov

  15. Should You Trust Your Cloud Storage Provider?

    There are many misconceptions when it comes to how most file sync and sharing services handle business-critical information

    1. Photo of István Molnár

      István Molnár

      Security & Compliance Specialist, Tresorit

  16. Security by Sector: How Smartphone Biometric Risks Threaten the Banking Industry

    New research shows just how easy it is to bypass smartphone fingerprint tech

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  17. Paving the Way for an Even More Remarkable Decade in Information Security

    2010's remarkable developments has paved the way for an exciting future

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  18. Building a Security Testing Plan

    Testing the effectiveness of your controls is imperative to knowing your true security posture

    1. Photo of Eyal  Wachsman

      Eyal Wachsman

      CEO and Co-Founder, Cymulate

  19. Why Diversity In Security Teams Can Give Organizations An Edge Over Cyber-criminals

    As threats become more diverse, so must the teams we put in place to defend against them

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  20. Security by Sector: FireEye and Claroty Team Up to Simplify ICS/OT Threat Detection and Response

    Firms announce platform integration to bolster security of industrial and operational control processes

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?