Infosecurity Blogs

  1. How to Cure the Healthcare System's 'Cyberflu'

    How vulnerable is the healthcare industry to cyber-attack, and who needs to take the lead to improve its posture?

    1. Photo of Aviv  Grafi

      Aviv Grafi

      CEO of Votiro

  2. Treat Security Data With the Same Purpose as Financial Data

    There’s a comparable amount of security data as there is financial data flowing through a financial organization.

    1. Photo of Liz Maida

      Liz Maida

      Founder, CEO and CTO of Uplevel Security

  3. Why Healthcare Cannot Afford to Rely on Two-Factor Authentication

    On its own, 2FA will protect you some of the time but not all the time.

    1. Photo of Keith Graham

      Keith Graham

      Chief Technology Officer at SecureAuth and Core Security

  4. The Cost of Sharing Our Data Online

    A personality app harvested your data and Facebook and Cambridge Analytica faced government scrutiny, but we knew this was coming.

    1. Photo of Simon McCalla

      Simon McCalla

      CTO, Nominet

  5. Compliance and Your Data Center

    Compliance standards aren't only in place to make your life difficult, they exist for the good of your business.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  6. Understand the Inherent Risk in Browser Extensions

    A look at vulnerabilities in browser application stores that contain well-intentioned, yet vulnerable, extensions, as well as purposefully developed malware.

    1. Photo of Frank Downs

      Frank Downs

      Senior Director of Cybersecurity Advisory and Assessment Solutions, ISACA

  7. Supporting a Back-to-Basics Approach with Cyber Threat Intelligence

    Threat intelligence can be an invaluable early warning system in helping to identify and block potential threats before they escalate and become problems.

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  8. GDPR Questions Answered: Where do I Learn to be a DPO?

    How to learn and train to be a data protection officer, and how your organization matters.

    1. Photo of Steve Wright

      Steve Wright

      Group Data Privacy Officer

  9. We Must Attract Women into Cybersecurity to Close the Skills Gap #IWD2018

    By leveraging the increasing interest among women in technology today and inspiring teenagers and young girls into the sector through education, industry leaders could dramatically reduce the workforce deficit.

    1. Photo of Michelle Johnson Cobb

      Michelle Johnson Cobb

      Chief Marketing Officer, Skybox Security

  10. Is This The Year of Reckoning for the CISO - Part Two

    Why businesses must play their part in supporting and elevating the CISO role.

    1. Photo of Stephen Moore

      Stephen Moore

      Chief Security Strategist, Exabeam

  11. Security Community Must Grapple with AI's Ascent

    AI has been positioned as the technology on the verge of transforming many aspects of society.

    1. Photo of Robert Clyde

      Robert Clyde

      Past ISACA Board Chair, Crypto Quantique Board Chair and Cybral Board Director

  12. Is This The Year of Reckoning for the CISO - Part One

    Could the role of the CISO come under the most scrutiny in 2018?

    1. Photo of Stephen Moore

      Stephen Moore

      Chief Security Strategist, Exabeam

  13. Protecting your Data from the Hacker Threat in 10 Simple Steps: Part 2

    Remaining five best security practices to adopt in order to help ensure your organization is as protected as possible from security threats.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  14. Maturity in Your Cybersecurity Culture

    ENISA has published the most comprehensive and applicable recommendations and structure for setting up and running a successful security culture program.

    1. Photo of Kai Roer

      Kai Roer

      Founder and CEO of CLTRe

  15. Panel Discussion: Managing Third Party Risk, Cloud & Supply Chain Complexity

    A panel discussion on managing third party risk, cloud and supply chain complexity amidst ever-changing regulatory frameworks

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  16. Making Security Awareness Work in 2018 - Get SMARTER

    It's not too late to create a SMARTER security awareness and training program.

    1. Photo of Perry Carpenter

      Perry Carpenter

      Chief Evangelist and Strategy Officer, KnowBe4

  17. NIS and the Critical National Infrastructure

    Looking at the implications of the Government’s recent announcement on the Network and Information Systems security directive for UK CNI

    1. Robert Orr

      Cybersecurity Principal Consultant CNI at Context Information Security

  18. No Silver Bullet for GDPR Compliance

    The challenge for many of us is that we may not easily be able to afford the range of skills we need for a GDPR compliance team.

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  19. "In the Underworld" - What can Cybersecurity learn from the World of 1980s' Professional Crime?

    What can the modern cybersecurity company learn from a 1980s criminal investigations?

    1. Photo of Chris Mayers

      Chris Mayers

      Chief Security Architect, Citrix

  20. GDPR Questions Answered: Our Web App Could Store Data

    To help solve your GDPR queries, data privacy offer and expert Steve Wright is joining us to answer your questions.

    1. Photo of Steve Wright

      Steve Wright

      Group Data Privacy Officer

What’s hot on Infosecurity Magazine?