Infosecurity Blogs

  1. Why You Need Private Browsing

    If you thought browsing securely (and privately) was as easy as opening a new incognito window, think again.

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  2. EU GDPR Final Countdown: How to Prepare Your Security Program

    GDPR will have real-world impact, and not just for EU member states.

    1. Photo of Gavin Millard

      Gavin Millard

      Technical Director, Tenable

  3. Is DDoS Protection Right For You?

    What should a company do about DDoS? They should follow a risk-based methodology to judge cost and weigh it against benefits and ways to address the risk.

    1. Photo of Aurobindo Sundaram

      Aurobindo Sundaram

      Head of Information Assurance & Data Protection, RELX Group

  4. Key Details on the Australian Meta-Data Retention Law

    As Australia's newly approved Data Retention law comes into effect, how does it actually affect the average internet user?

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  5. How To Sell Endpoint Security to Business Leaders

    Engaging with C-suite execs, security pros can more effectively explain and advocate the need to invest while leading the business toward a safer future.

    1. Photo of Christoph Ruef

      Christoph Ruef

      Vice president and general manager, printing business., HP

  6. Why Bill 34 is Bad News for Internet Privacy

    The S.J.Res. 34 bill has effectively destroyed the privacy of internet users in the US and has taken the world by storm.

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  7. The 'Dark RAT'

    In March 2017, Fujitsu Cyber Threat Intelligence uncovered a newly developed remote access tool referred to by its developer as ‘Dark RAT'

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  8. The Domain Name and its Role in Cyber Forensics

    It remains very easy for anyone to inexpensively buy a domain name, obtain an IP address and set up a host server.

    1. Photo of Tim Helming

      Tim Helming

      Director of Product Management, DomainTools

  9. The Security Challenges of Enterprise Container Adoption

    The blending of development and operations processes into DevOps has also changed the way software is deployed.

    1. Photo of Anthony Bettini

      Anthony Bettini

      Senior Director of Software Engineering, Tenable

  10. Your 2017 Data Centre Security Checklist

    There is big money to be made extorting an organization’s data center—or “brain”.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  11. #WCSC17: A Day at World Cybersecurity Congress 2017

    This week Islington’s Business Design Centre played host to the World Cybersecurity Congress 2017, with a schedule packed full of interesting sessions and discussions from speakers from a variety of different sectors and specialties

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  12. GDPR Compliance: Time to Face Mission Impossible?

    The subject of GDPR compliance continues to be on the lips of many in the information security industry, and rightly so as the regulation promises to revolutionize the way we work and store data

  13. The Rise of the Threat Hunter

    Being proactive, sniffing out threats, and improving detection and response times is vital in the ongoing fight against cyber-attacks. A mix of prevention and response is the ideal strategy.

    1. Photo of Destiny Bertucci

      Destiny Bertucci

      Head Geek, SolarWinds

  14. #SecuriTay 2017 & the Future of An Industry

    Held in Dundee’s Abertay University, and now in its sixth year, SecuriTay is organized by the Ethical Hacking Society and “aimed at anyone with an interest in hacking and information security”

  15. #RSAC: Wendy Nather: Why AV Should Never Have Been Invented and Why We've Brought the Skills Gap on Ourselves

    Wendy Nather talks AV, skills gap, CISO decisions and why passwords should be written down

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  16. Digesting the Diversity of Data Breaches

    The diverse nature of cyber-threats can make one quite unique from another, affecting every department within an organization and no longer confined to the IT department

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  17. Eagles Take the #Superbowl of Passwords

    Based on the release of ten million passwords, the data crunching revealed that the most popular gridiron team for a password was the Philadelphia Eagles, followed by the Dallas Cowboys, Pittsburgh Steelers and Oakland Raiders

  18. Come Fly with Me: Securing the Drone

    New report seeks to aid the safe and secure creation and operation of unmanned aircraft systems

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  19. Ultrasonic Cross-Device Tracking

    The Risk Avengers take a look at the issue of ultrasonic cross-device tracking

    1. Photo of The  Risk Avengers

      The Risk Avengers

      Information Security Consultancy

  20. (ISC)2 - Top Trends to Watch in 2017

    As we enter 2017, this will be the year in which the potential cracks in the pillars of the knowledge economy start to show.

    1. Photo of Adrian Davis

      Adrian Davis

      Consulting COO & CIO

What’s hot on Infosecurity Magazine?