Infosecurity Blogs
#RSAC: Wendy Nather: Why AV Should Never Have Been Invented and Why We've Brought the Skills Gap on Ourselves
Wendy Nather talks AV, skills gap, CISO decisions and why passwords should be written down
Digesting the Diversity of Data Breaches
The diverse nature of cyber-threats can make one quite unique from another, affecting every department within an organization and no longer confined to the IT department
Eagles Take the #Superbowl of Passwords
Based on the release of ten million passwords, the data crunching revealed that the most popular gridiron team for a password was the Philadelphia Eagles, followed by the Dallas Cowboys, Pittsburgh Steelers and Oakland Raiders
Come Fly with Me: Securing the Drone
New report seeks to aid the safe and secure creation and operation of unmanned aircraft systems
Ultrasonic Cross-Device Tracking
The Risk Avengers take a look at the issue of ultrasonic cross-device tracking
(ISC)2 - Top Trends to Watch in 2017
As we enter 2017, this will be the year in which the potential cracks in the pillars of the knowledge economy start to show.
RIG EK Dropping TrickBot Trojan & Madness/Quant Loader DoS Bot
As the exploit market begins to diversify, it has seen the introduction of new threats, the most recent being the inclusion of a relative new comer in TrickLoader and an older threat known as TrickBot
DaaS, VDI, and the Changing World of the Desktop
This brave new world has even seen significant changes in the way that desktops are delivered, with DaaS (desktop as a service) and VDI (virtual-desktop infrastructure) becoming a more pressing need for modern business.
On the 12th Day of Christmas, the Industry Predicted…a Skills Gap Challenge
Experts have their say on what they expect the cybersecurity skills scene to be like in 2017
On the 11th Day of Christmas, the Industry Predicted…Better Security Collaboration
2017 could be the year we see collaborative security come into fruition like never before
On the Tenth Day of Christmas, the Industry Predicted…Cloud Vendor Compromise
Experts predict that a major cloud vendor will be in the news for suffering a significant security breach
Deck the Halls With...Cybersecurity Awareness
The Risk Avengers have written a Christmas song especially for the Infosecurity Magazine readers.
On the Ninth Day of Christmas, the Industry Predicted…GDPR Compliance
Of course this is a 2017 prediction and I’m well aware that the General Data Protection Regulation (GDPR) does not come into force until 25th May 2018, but with 526 days to go, 2017 is the final full calendar year to achieve compliance and predictions seen by Infosecurity show that it is a case of now or never for your preparations
On the Eighth Day of Christmas, the Industry Predicted…Attackers Making Money
In our eighth prediction, we will take a look at the miscreant attackers and predictions on what they will be up to in 2017, and how they will find ways to make more money.
On the Seventh Day of Christmas, the Industry Predicted…More Mention of AI
The concept of machine learning, automation and artificial intelligence (AI) have got a lot of attention over the past couple of years, and it is predicted that this will continue into 2017
On the Sixth Day of Christmas, the Industry Predicted…a Big Year for IoT
Internet of Things (is a topic keeping the minds of a lot of specialists busy, with numerous envisaging it to play a major role next year
On the Fifth Day of Christmas, the Industry Predicted…More Social Media Attacks
Social media and networking sites will be prime attack targets in 2017, each carrying its own set of risks
Dridex Targets Scotland
Dridex recently targeted victims using a football lure in an attempt to deliver the malicious trojan
On the Fourth Day of Christmas, the Industry Predicted…CIOs to Reclaim Ownership of Data Initiatives
2017 could be the year in which CIOs will secure their future by reclaiming ownership of data initiatives
On the Third Day of Christmas, the Industry Predicted…More Political Disruption
Experts warn nation states and their sponsored operatives will use cyber espionage more and more next year to cause political shifts, disruption and to gain economic advantage