Infosecurity Blogs

  1. Security by Sector: Construction Industry “Most Vulnerable” to Phishing Scams

    Report reveals which industries are most likely to fall for phishing attacks

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  2. Why Wednesday Could be the Riskiest Day for Your Business

    Are we placing too much pressure on people to act, and act perfectly, 100% of the time?

    1. Photo of Tim Sadler

      Tim Sadler

      CEO, Tessian

  3. How to Fill the Cybersecurity Skills Gap

    With cyber-attacks increasing in frequency and severity, we need to upskill existing IT and computer science professionals to meet demand

  4. Security Engineers: Fighting Every Minute of Every Day

    How security engineers successfully mitigate the world’s worst cyber-attacks

  5. Security by Sector: ICS/OT Cybersecurity Risk is at Critical Level, Say Security Pros

    More damning data regarding the cyber-risks surrounding industrial control systems and operational technology

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  6. No Substitute for Experience – Or CISOs’ Backgrounds

    Nothing can prepare an individual for life’s hurdles more appropriately than previous experience, especially in cybersecurity

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  7. The Big Connect: How Data Science is Helping Cybersecurity

    How data science is being used to protect our information

  8. The Importance of a Cybersecurity Strategy for the Business

    It is unfortunate that some companies still consider malware to be a minor threat

    1. Maciej Sikora

      Technical Writer, Comarch

  9. Should Your Threat Intelligence Team Contain Certified Threat Intelligence Analysts?

    Is the appointment of a threat intelligence team enough?

    1. Photo of Tiru Dehariya

      Tiru Dehariya

      Content Writer at EC-Council

  10. The Changing Face of Cybersecurity: Protecting Consumers and SMEs

    Small businesses leak information that criminals can freely obtain and abuse

    1. Photo of Andrew Martin

      Andrew Martin

      CEO of Dynarisk

  11. Embracing Your Legacy: Protecting Legacy Systems in a Modern World

    Legacy infrastructure is still a crucial part of enterprises across many industries

    1. Photo of Lior  Neudorfer

      Lior Neudorfer

      Head of Product, Guardicore

  12. Security by Sector: Digital Transformation in the Healthcare System

    The healthcare industry has traditionally struggled with information security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  13. How Many Passwords Should be in a Password Blacklist?

    The answer should be as many as possible, but current advice is conflicting

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  14. Should the UK Ban Huawei?

    A ban on Huawei is actually the wrong approach

    1. Photo of Andrew Barratt

      Andrew Barratt

      Vice President, Technology & Enterprise, Managing Director, International, Coalfire

  15. Behind the Scenes & in Front of the Attack: The Largest DDoS Attack on Record

    An attack large enough to take many countries offline, yet it was over before it ever got a chance to do harm

  16. The Rise of Account Takeover Fraud in the Media Industry

    A robust criminal ecosystem is acting as a parasite on the wave of content shifting to OTT delivery models

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  17. On-Prem WAFs: Lacking the Scale & Flexibility to Thwart Today’s Threats

    A cloud-based security solution that is deployed at the edge of the network is in greater demand, and driving the market

  18. Security: a Missing Ingredient in Many DevOps Implementations

    The most successful organizations of the future will make DevSecOps a cornerstone of their business operations

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  19. The Security Landscape is Constantly Evolving: Are You Ready?

    The one certainty in the world of cybersecurity is that change is imminent

  20. Micro-Segmentation: A Solid Security Requirement in a Turbulent Environment

    The need for micro-segmentation as a security solution is not new

    1. Photo of Sharon  Besser

      Sharon Besser

      Vice-President of Products, Guardicore

What’s hot on Infosecurity Magazine?