Infosecurity Blogs
Protecting Your Data From The Hacker Threat, Part One
These approaches can be implemented in every data center, and will go a long way in minimizing susceptibility to attack.
Failed Incident Responses from 2017 Provide Important Case Studies
How 2017 will provide instructors are armed with new, relevant material that can provide excellent case studies on how not to respond to an incident.
How 2017 Thrusted Cybersecurity Into the National Spotlight
Skills, ransomware and unpatched systems made 2-17 a memorable year in cybersecurity.
What are IT professionals guilty of in 2017?
Perhaps it's time to shine an uncompromising light on the IT security failures of 2017—the sins we are guilty of as IT professionals—in a hopeful bid to inspire us to instigate change and maybe even prepare New Years' resolutions for 2018 that will actually be kept.
Security by Liquified Information
A mismatch about what roles, responsibilities, and complexity are imposed by current information security risk management.
Punycode: Undetectable, but not Unbeatable
While Punycode attacks can be beaten, there’s only so much that businesses can do to protect individuals and organizations.
CRM Communication via Beacons with Security & Privacy in Mind
Beacon technology is becoming more and more popular within retailers
Successful Digital Transformation Requires Swift, but Informed Action
Digital transformation is overhauling how enterprises are going about meeting those objectives.
Why BYOD Authentication Struggles to be Secure
Given that the general concept in security has always been to eliminate passwords and use MFA, recent survey results are surprising, so why is there a disconnect?
Pen Testing & Scanning for Vulnerabilities: Differences & Methodologies
The question of how to protect a business and prevent attacks has never been more important
Security Alert: Worrisome Security Risks Discovered in LG Smart Devices
Smart vacuum cleaners with sensors and a video camera can be hacked and abused by cyber-criminals
Improving Network Security With Software-Defined Networking
SDN has shifted the perception of value from hardware to software, and has made it crucial to understand the evolving cyber threat landscape and security challenges around it.
Huge Changes are Coming: it's Time to Prepare Technologically for GDPR
Should we expect GDPR to create a major upheaval? Do the upcoming changes hold anything to fear? The answer to both questions is “not necessarily”.
The Top 10 Worst Social Media Cyber-Attacks
In light of National Cybersecurity Awareness Month, the ZeroFOX team compiled a list of the ten worst social media attacks of all time.
Tools Every IT Department Needs to Use
Despite there now being far greater awareness of cybersecurity threats, the preventative measures that organizations are adopting are largely either insufficient or ineffective.
Cutting the Phishing Line with User Authorization
Identity theft is still a problem in the 21st century. More and more areas of our lives are being supported by IT. Banking, e-business and education are just some areas in which an individual’s identity is used in virtual and digital reality
User Behavior Analytics Alone is Not Enough for Combatting Insider Threats
Insider threats come in so many flavors it takes integration and collaboration to prioritize what’s most important.
Is Your Company Ready to Face Tomorrow’s Security Risks?
Malgorzata Zabieglinska-Lupa speaks to Paulina Świątek and Maciej Rosołek about trends in the security technology market and what companies can do to protect themselves
74% of Breaches from Insiders or Outsiders?
Reports claim that 74% of breaches are down to insiders, or outsiders. Who is correct, and what does the reader learn?