Infosecurity Blogs

  1. Security by Sector: ICS/OT Cybersecurity Risk is at Critical Level, Say Security Pros

    More damning data regarding the cyber-risks surrounding industrial control systems and operational technology

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  2. No Substitute for Experience – Or CISOs’ Backgrounds

    Nothing can prepare an individual for life’s hurdles more appropriately than previous experience, especially in cybersecurity

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  3. The Big Connect: How Data Science is Helping Cybersecurity

    How data science is being used to protect our information

  4. The Importance of a Cybersecurity Strategy for the Business

    It is unfortunate that some companies still consider malware to be a minor threat

    1. Maciej Sikora

      Technical Writer, Comarch

  5. Should Your Threat Intelligence Team Contain Certified Threat Intelligence Analysts?

    Is the appointment of a threat intelligence team enough?

    1. Photo of Tiru Dehariya

      Tiru Dehariya

      Content Writer at EC-Council

  6. The Changing Face of Cybersecurity: Protecting Consumers and SMEs

    Small businesses leak information that criminals can freely obtain and abuse

    1. Photo of Andrew Martin

      Andrew Martin

      CEO of Dynarisk

  7. Embracing Your Legacy: Protecting Legacy Systems in a Modern World

    Legacy infrastructure is still a crucial part of enterprises across many industries

    1. Photo of Lior  Neudorfer

      Lior Neudorfer

      Head of Product, Guardicore

  8. Security by Sector: Digital Transformation in the Healthcare System

    The healthcare industry has traditionally struggled with information security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  9. How Many Passwords Should be in a Password Blacklist?

    The answer should be as many as possible, but current advice is conflicting

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  10. Should the UK Ban Huawei?

    A ban on Huawei is actually the wrong approach

    1. Photo of Andrew Barratt

      Andrew Barratt

      Vice President, Technology & Enterprise, Managing Director, International, Coalfire

  11. Behind the Scenes & in Front of the Attack: The Largest DDoS Attack on Record

    An attack large enough to take many countries offline, yet it was over before it ever got a chance to do harm

  12. The Rise of Account Takeover Fraud in the Media Industry

    A robust criminal ecosystem is acting as a parasite on the wave of content shifting to OTT delivery models

    1. Photo of Patrick Sullivan

      Patrick Sullivan

      CTO, Security Strategy, Akamai

  13. On-Prem WAFs: Lacking the Scale & Flexibility to Thwart Today’s Threats

    A cloud-based security solution that is deployed at the edge of the network is in greater demand, and driving the market

  14. Security: a Missing Ingredient in Many DevOps Implementations

    The most successful organizations of the future will make DevSecOps a cornerstone of their business operations

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  15. The Security Landscape is Constantly Evolving: Are You Ready?

    The one certainty in the world of cybersecurity is that change is imminent

  16. Micro-Segmentation: A Solid Security Requirement in a Turbulent Environment

    The need for micro-segmentation as a security solution is not new

    1. Photo of Sharon  Besser

      Sharon Besser

      Vice-President of Products, Guardicore

  17. Incident Response: Endgame

    What incident response lessons can we learn from the latest Marvel episode?

    1. Photo of David Gray

      David Gray

      Director, NTT Ltd

  18. Understanding ICO Password Recommendations

    Passwords may be a small part of GDPR requirements, but they also represent the easiest way to gain unauthorized access to personally identifiable data

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  19. Perspective Changes Everything: Shift Your Focus to the Edge

    There was a time when you could build a virtual wall and protect anything inside a data center – but times have changed

  20. Survival of the Fittest: Take Security to the Edge

    Deploying security at the edge allows you to keep pace with a complex and constantly changing digital ecosystem

What’s hot on Infosecurity Magazine?