Infosecurity Blogs

  1. Password Requirements from NCSC & Cyber Essentials

    Simplify passwords for users and put the burden on the authentication system

    1. Photo of Karen  Bowen

      Karen Bowen

      Account Manager, Specops Software – An Outpost24 Company

  2. How Embracing Micro-Segmentation Helps You Master PCI Compliance

    The art of mastering PCI DSS compliance is primarily about defining the scope of compliance

    1. Photo of Dave Klein

      Dave Klein

      Senior Director of Engineering & Architecture, Guardicore

  3. Keeping Innovation Flowing: What Makes a Successful Cyber Startup?

    How can a cybersecurity startup succeed?

    1. Photo of Grace Cassy

      Grace Cassy

      Co-Founder, CyLon

  4. Is Effective Cybersecurity Expensive?

    Whether effective cybersecurity really is very expensive

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  5. Are You Mature Enough to Secure Your Cloud to its Fullest Extent?

    Every organization, whether it’s using on-prem, public cloud, or hybrid cloud architecture, needs a suitable security solution

    1. Photo of Sharon  Besser

      Sharon Besser

      Vice-President of Products, Guardicore

  6. Culture Carriers: Amplifying Your Security Awareness Message

    How a culture carrier can benefit your company

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  7. How to be Secure in the Challenging Business Landscape

    Data security applies in equal measure to start-ups, small- and medium-sized enterprises, and global consortia

    1. Photo of Malgorzata Zabieglinska–Lupa

      Malgorzata Zabieglinska–Lupa

      ICT Product Manager, Comarch

  8. There’s No Day Off for Cybersecurity Professionals

    How can IT professionals continue to juggle multiple roles and tasks?

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  9. The Battle for Cybersecurity Talent Must Include Retention Emphasis

    As companies compete over valuable cybersecurity professionals, retention becomes difficult

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  10. Password Managers - Popular and Safe

    Password managers are safe to use, don't believe the hype

    1. Photo of Gary Williams

      Gary Williams

      IT Infrastructure manager

  11. Continuous Learning is the Only Path to the Next 50 Years in Technology

    How technology has evolved since the foundation of ISACA 50 years ago, and what the next half century could look like.

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  12. Cybersecurity: Billions Pour In, Basics Languish

    2018’s headlines only underscored the need for robust data security with over 2 billion records stolen.

    1. Photo of Ken Mafli

      Ken Mafli

      Senior Digital Marketing Manager at Townsend Security

  13. How to Get Cybersecurity Right in 2019

    Cybercrime losses continue to go up, but spending does not match the figures. What needs to be changed to balance the numbers out?

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  14. 2019 Predictions: Part Three

    As 2018 draws to a close, the industry turns its thoughts to next year and preparing for the trends, threats and challenges that 2019 might have in store

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  15. Time: An Attacker’s Best Friend

    Analysis of the 'staggering' breach at Marriott, and what made the attack unique.

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  16. 2019 Predictions: Part Two

    As 2018 draws to a close, the industry turns its thoughts to next year and preparing for the trends, threats and challenges that 2019 might have in store

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  17. 2019 Predictions: Part One

    As 2018 draws to a close, the industry turns its thoughts to next year and preparing for the trends, threats and challenges that 2019 might have in store

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. The TrickBot and MikroTik Connection – A Story of Investment and Collaboration

    The increasing involvement of MikroTik hosts in malicious activity.

    1. Photo of Wicus Ross

      Wicus Ross

      Lead Security Researcher, SecureData Labs

  19. Are Lawyers the Best Judge of Cybersecurity?

    It's not just lawmakers who sometimes seem ill equipped when it comes to cybersecurity; lawyers can be far from perfect in this regard too.

    1. Photo of John Safa

      John Safa

      Founder and CTO of Pushfor

  20. The Importance of "S" in "CISO"

    As cybersecurity has become the need of the business, we turn to our management for guidance from a CISO.

    1. Photo of Vaishali Vuppu

      Vaishali Vuppu

      Cybersecurity Enthusiast

What’s hot on Infosecurity Magazine?