Infosecurity Blogs

  1. Back to the Basics - Why we Shouldn't Discount the Lessons of the Cyber Essentials Scheme

    How the Cyber Essentials scheme can aid your cybersecurity resiliency.

    1. Photo of Andrew Avanessian

      Andrew Avanessian

      Chief operating officer at Avecto

  2. Security Culture has to be Intentional and Sustainable

    Your security culture is – and will always be – a subcomponent of your larger organizational culture.

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  3. The Perils of Full Administrator Rights

    Gaining access to administrative rights is one of the most potent weapons for any malicious agent

    1. Photo of Andrew Avanessian

      Andrew Avanessian

      Chief operating officer at Avecto

  4. Why is the Lucrative Cybersecurity Field still Struggling to Hook Prospective Practitioners?

    Only 9% of millennials state they are interested in pursuing cybersecurity as a career at some point in their lives.

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  5. Dixons Carphone Breach & GDPR: What’s Next?

    The first big-name breach post-GDPR has been confirmed, so what can we expect to happen next?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  6. To Inform or Not to Inform, There Should be No Question

    The responsibility of security specialists to both be informed and inform others.

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

  7. The Virtuous Circle between Security Culture and Security Behavior

    When values come into conflict, organizations stand to see all their hard work around security policies come undone.

    1. Photo of Bruce  Hallas

      Bruce Hallas

      Author and Host, Re-thinking the Human Factor (book and podcast)

  8. Cities Must Do More to Modernize Technologic Infrastructure

    There is no shortage of motivation for cities to modernize.

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  9. GDPR Questions Answered: Are you still Covered if you Leave Europe?

    If you're an EU citizen, are you still protected under GDPR if you leave the EU to live in Asia? Data Protection advisor Jon Baines answers your compliance questions.

    1. Photo of Jon Baines

      Jon Baines

      Data Protection Advisor at Mishcon de Reya LLP, and Chair of NADPO

  10. GDPR in Schools: The View from a DPO and School Governor

    The recent DfE GDPR Toolkit for Schools does not cover all the scenarios of GDPR and/or how to implement the policies necessary to help ensure the rules are followed.

    1. Photo of Steve Wright

      Steve Wright

      Group Data Privacy Officer

  11. Using Marketing Strategies to Influence Security Behaviour

    When it comes to influencing security behavior, it’s helpful to first look at effective marketing strategies.

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  12. GDPR Questions Answered: Is My Blog Compliant?

    Is my blog compliant with GDPR? Jon Baines from NADPO answers your questions.

    1. Photo of Jon Baines

      Jon Baines

      Data Protection Advisor at Mishcon de Reya LLP, and Chair of NADPO

  13. Don't WannaCry Again? Here's How to Prevent it

    A year since WannaCry, how much has security learned about applying the basics?

    1. Photo of Alex Manea

      Alex Manea

      CSO, BlackBerry

  14. GDPR Questions Answered: Do We Need Consent to Hold Information in a Database?

    Does a database of available information comply with GDPR? Jon Baines from NADPO answers your questions.

    1. Photo of Jon Baines

      Jon Baines

      Data Protection Advisor at Mishcon de Reya LLP, and Chair of NADPO

  15. Mumbo-Jumbo Conquered the World and Created Confusion around Security Analytics

    How poor explanations and bad scientific method have twisted belief and understanding in both science and security analytics

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

  16. State of Cybersecurity 2018: Enterprises Can Do Better

    Are things in cybersecurity better or worse than they were 12 months ago?

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  17. Dispelling the FUD: Key insights from the "#GDPR for Dummies" Roadshow

    Metacompliance offers advice collected from common questions on its GDPR for Dummies" Roadshow.

    1. Photo of Shane Fuller

      Shane Fuller

      Lead Privacy Advisor at MetaCompliance, Co-Author of the official ‘GDPR for Dummies’

  18. Data Breach Notifications and Why Honesty is the Best Policy

    In the case of a data breach, it's in a business’s best interest to be as honest with customers as possible.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  19. Securing Your Organization's Human Layer

    There is value in adopting a cybersecurity framework because of the structured manner of thinking that it helps impose.

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  20. Securing Critical Infrastructure in the Wake of Unprecedented Cyber Threats

    New legislation is due this month to help make nations more resilient in the face of disruptive malware.

    1. Photo of Gavin Millard

      Gavin Millard

      Technical Director, Tenable

What’s hot on Infosecurity Magazine?