Infosecurity Blogs

  1. So I've Removed Admin Rights...What Now?

    Restricting user admin rights is just one important part of improving data security.

    1. Photo of Andrew Avanessian

      Andrew Avanessian

      Chief operating officer at Avecto

  2. Tanium Versus Tachyon: The Big Beasts of the Endpoint Detection and Remediation Jungle go Head-To-Head

    Failure to research next generation EDR tools can result in buying a solution unsuited to today’s workplace.

    1. Photo of Corné Human

      Corné Human

      Senior Product Marketing Manager

  3. To Reward, or Not to Reward

    Many CSOs have resorted to incentives and punishments to enhance employee reporting of suspect emails and cyber activities, but which of these really work?

    1. Photo of Arun Vishwanath

      Arun Vishwanath

      Researcher, Author, Technologist

  4. Should We be Looking Down Under to Improve Our Security?

    Organizations that can implement the Essential Eight measures are more likely to be secure against an online assault.

    1. Photo of Andrew Avanessian

      Andrew Avanessian

      Chief operating officer at Avecto

  5. What Can the World Cup Teach Us About Cybersecurity?

    Just like with World Cup results, in cybersecurity it is not always the team with the strongest players or the best technical strategy that wins.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  6. Back to the Basics - Why we Shouldn't Discount the Lessons of the Cyber Essentials Scheme

    How the Cyber Essentials scheme can aid your cybersecurity resiliency.

    1. Photo of Andrew Avanessian

      Andrew Avanessian

      Chief operating officer at Avecto

  7. Security Culture has to be Intentional and Sustainable

    Your security culture is – and will always be – a subcomponent of your larger organizational culture.

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  8. The Perils of Full Administrator Rights

    Gaining access to administrative rights is one of the most potent weapons for any malicious agent

    1. Photo of Andrew Avanessian

      Andrew Avanessian

      Chief operating officer at Avecto

  9. Why is the Lucrative Cybersecurity Field still Struggling to Hook Prospective Practitioners?

    Only 9% of millennials state they are interested in pursuing cybersecurity as a career at some point in their lives.

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  10. Dixons Carphone Breach & GDPR: What’s Next?

    The first big-name breach post-GDPR has been confirmed, so what can we expect to happen next?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  11. To Inform or Not to Inform, There Should be No Question

    The responsibility of security specialists to both be informed and inform others.

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

  12. The Virtuous Circle between Security Culture and Security Behavior

    When values come into conflict, organizations stand to see all their hard work around security policies come undone.

    1. Photo of Bruce  Hallas

      Bruce Hallas

      Author and Host, Re-thinking the Human Factor (book and podcast)

  13. Cities Must Do More to Modernize Technologic Infrastructure

    There is no shortage of motivation for cities to modernize.

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  14. GDPR Questions Answered: Are you still Covered if you Leave Europe?

    If you're an EU citizen, are you still protected under GDPR if you leave the EU to live in Asia? Data Protection advisor Jon Baines answers your compliance questions.

    1. Photo of Jon Baines

      Jon Baines

      Data Protection Advisor at Mishcon de Reya LLP, and Chair of NADPO

  15. GDPR in Schools: The View from a DPO and School Governor

    The recent DfE GDPR Toolkit for Schools does not cover all the scenarios of GDPR and/or how to implement the policies necessary to help ensure the rules are followed.

    1. Photo of Steve Wright

      Steve Wright

      Group Data Privacy Officer

  16. Using Marketing Strategies to Influence Security Behaviour

    When it comes to influencing security behavior, it’s helpful to first look at effective marketing strategies.

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  17. GDPR Questions Answered: Is My Blog Compliant?

    Is my blog compliant with GDPR? Jon Baines from NADPO answers your questions.

    1. Photo of Jon Baines

      Jon Baines

      Data Protection Advisor at Mishcon de Reya LLP, and Chair of NADPO

  18. Don't WannaCry Again? Here's How to Prevent it

    A year since WannaCry, how much has security learned about applying the basics?

    1. Photo of Alex Manea

      Alex Manea

      CSO, BlackBerry

  19. GDPR Questions Answered: Do We Need Consent to Hold Information in a Database?

    Does a database of available information comply with GDPR? Jon Baines from NADPO answers your questions.

    1. Photo of Jon Baines

      Jon Baines

      Data Protection Advisor at Mishcon de Reya LLP, and Chair of NADPO

  20. Mumbo-Jumbo Conquered the World and Created Confusion around Security Analytics

    How poor explanations and bad scientific method have twisted belief and understanding in both science and security analytics

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

What’s hot on Infosecurity Magazine?