Infosecurity Blogs

  1. #RSAC: Wendy Nather: Why AV Should Never Have Been Invented and Why We've Brought the Skills Gap on Ourselves

    Wendy Nather talks AV, skills gap, CISO decisions and why passwords should be written down

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  2. Digesting the Diversity of Data Breaches

    The diverse nature of cyber-threats can make one quite unique from another, affecting every department within an organization and no longer confined to the IT department

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  3. Eagles Take the #Superbowl of Passwords

    Based on the release of ten million passwords, the data crunching revealed that the most popular gridiron team for a password was the Philadelphia Eagles, followed by the Dallas Cowboys, Pittsburgh Steelers and Oakland Raiders

  4. Come Fly with Me: Securing the Drone

    New report seeks to aid the safe and secure creation and operation of unmanned aircraft systems

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. Ultrasonic Cross-Device Tracking

    The Risk Avengers take a look at the issue of ultrasonic cross-device tracking

    1. Photo of The  Risk Avengers

      The Risk Avengers

      Information Security Consultancy

  6. (ISC)2 - Top Trends to Watch in 2017

    As we enter 2017, this will be the year in which the potential cracks in the pillars of the knowledge economy start to show.

    1. Photo of Adrian Davis

      Adrian Davis

      Consulting COO & CIO

  7. RIG EK Dropping TrickBot Trojan & Madness/Quant Loader DoS Bot

    As the exploit market begins to diversify, it has seen the introduction of new threats, the most recent being the inclusion of a relative new comer in TrickLoader and an older threat known as TrickBot

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  8. DaaS, VDI, and the Changing World of the Desktop

    This brave new world has even seen significant changes in the way that desktops are delivered, with DaaS (desktop as a service) and VDI (virtual-desktop infrastructure) becoming a more pressing need for modern business.

    1. Photo of Mav Turner

      Mav Turner

      Director, IT Security Business, SolarWinds

  9. On the 12th Day of Christmas, the Industry Predicted…a Skills Gap Challenge

    Experts have their say on what they expect the cybersecurity skills scene to be like in 2017

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. On the 11th Day of Christmas, the Industry Predicted…Better Security Collaboration

    2017 could be the year we see collaborative security come into fruition like never before

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  11. On the Tenth Day of Christmas, the Industry Predicted…Cloud Vendor Compromise

    Experts predict that a major cloud vendor will be in the news for suffering a significant security breach

  12. Deck the Halls With...Cybersecurity Awareness

    The Risk Avengers have written a Christmas song especially for the Infosecurity Magazine readers.

    1. Photo of The  Risk Avengers

      The Risk Avengers

      Information Security Consultancy

  13. On the Ninth Day of Christmas, the Industry Predicted…GDPR Compliance

    Of course this is a 2017 prediction and I’m well aware that the General Data Protection Regulation (GDPR) does not come into force until 25th May 2018, but with 526 days to go, 2017 is the final full calendar year to achieve compliance and predictions seen by Infosecurity show that it is a case of now or never for your preparations

  14. On the Eighth Day of Christmas, the Industry Predicted…Attackers Making Money

    In our eighth prediction, we will take a look at the miscreant attackers and predictions on what they will be up to in 2017, and how they will find ways to make more money.

  15. On the Seventh Day of Christmas, the Industry Predicted…More Mention of AI

    The concept of machine learning, automation and artificial intelligence (AI) have got a lot of attention over the past couple of years, and it is predicted that this will continue into 2017

  16. On the Sixth Day of Christmas, the Industry Predicted…a Big Year for IoT

    Internet of Things (is a topic keeping the minds of a lot of specialists busy, with numerous envisaging it to play a major role next year

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  17. On the Fifth Day of Christmas, the Industry Predicted…More Social Media Attacks

    Social media and networking sites will be prime attack targets in 2017, each carrying its own set of risks

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. Dridex Targets Scotland

    Dridex recently targeted victims using a football lure in an attempt to deliver the malicious trojan

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  19. On the Fourth Day of Christmas, the Industry Predicted…CIOs to Reclaim Ownership of Data Initiatives

    2017 could be the year in which CIOs will secure their future by reclaiming ownership of data initiatives

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  20. On the Third Day of Christmas, the Industry Predicted…More Political Disruption

    Experts warn nation states and their sponsored operatives will use cyber espionage more and more next year to cause political shifts, disruption and to gain economic advantage

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?