Infosecurity Blogs

  1. On the Second Day of Christmas, the Industry Predicted…Poor Routine IT Practices

    Poor routine IT practices will cause the most avoidable harm to businesses next year

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  2. On the First Day of Christmas, the Industry Predicted...MORE RANSOMWARE

    As 2016 draws to a close, what lessons can be drawn from a year that was immersed in cybersecurity controversy and headline-making news, and what predictions can be made about what we expect to face in 2017?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  3. Trading in Compromised Remote Desktop Services

    There is a criminal underworld of compromised services in existence on dark web forums

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  4. ‘We'll Always Have Paris’ – Highlights from ISSE Conference 2016

    This week the beautiful city of Paris played host to the 17th annual ISSE Conference, bringing together a raft of security professionals and experts from around the world to discuss, debate and shape the future of digital identity

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. Closing the Gender Gap in Cybersecurity: Its Time to Back Ourselves as an Industry

    Cybersecurity is facing a frightening skills gap, so to put it simply, we need more people, so we need more women

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  6. Assessing the Cost of Brexit from a Cybersecurity Standpoint

    The cybersecurity community is equally looking to assess the impact of Brexit

    1. Harshul Joshi

      Senior Vice President of Cyber Governance, Risk and Compliance, DarkMatter

  7. 5 Common Mistakes When Dealing with Security Stakeholders – and How to Avoid Them

    Managing an initiative as business-critical as cybersecurity means IT and security leaders need to work closely with various stakeholders to agree to the security strategy, put them at ease that it will work and give them confidence that it will be effective

    1. Photo of Yishai Beeri

      Yishai Beeri

      Director of Cybersecurity Research, CloudLock

  8. Everything You Need to Know About RDNH

    Every business needs to take great care with its domain name. This is the word or words you choose to form your website address, literally your identity on the world wide web

    1. Photo of Debbie Fletcher

      Debbie Fletcher

      Technology Journalist

  9. The Pitfalls of Awareness

    Dr Jessica Barker reveals the three pitfalls of security awareness

    1. Photo of The  Risk Avengers

      The Risk Avengers

      Information Security Consultancy

  10. #FutureDecoded Dreaming of Electric Employees

    If you believed that terms such as artificial intelligence (AI), machine learning and digital transformation were the stuff of science fiction, then other sections of IT are proving that this is the new reality.

  11. Mirai - How a Botnet Made IoT a Security Reality

    I’ve been hearing about IoT for a number of years, and it was not until 2013 until I understood what the concept was about, and sometime after that the term was more defined as the concept of connected devices became more of a reality.

  12. International Cybersecurity Regulation Needs to Become Standard

    Harshul Joshi, DarkMatter, explains why international cybersecurity regulation needs to become the standard now

    1. Photo of Harshul Joshi

      Harshul Joshi

      Senior Vice-president of Cyber Governance, Risk and Compliance, DarkMatter

  13. Roundtable: Former Deputy Director of NSA Talks Insider Threats

    Chris Inglis discusses the insider threat talking his experiences with the NSA, transparency and the use of behavior analytics

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  14. The Shape of Things to Come – Advanced Networking Security for IoT

    There are all sorts of potential for IoT-related applications to streamline business processes and provide new ways of interacting with customers.

  15. The Rise of DDoS in IOT

    Bryan Campbell, Fujitsu, explores the rise of DDoS in IoT

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  16. #ISC2CongressEMEA: The Monkey, The Human & The Cybersecurity Awareness Program

    When it comes to security training and awareness, the prime objective of many organizations is to be able to demonstrate that all staff have completed security awareness training.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  17. #ISC2CongressEMEA: Combined Mitigation for Cyber and Physical Attacks

    At the (ISC)2 Congress EMEA in Dublin on October 18 2016, Barrie Millett drew upon his experience from the military and his resilience roles at E.ON and GE to advise on combined mitigation for cyber and physical attacks.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  18. The Yahoo hack – a numbers game

    Have you got a Yahoo email account? Was it one of the 500 million accounts compromised by the breach disclosed by Yahoo in September 2016? Does it matter if it was?

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  19. Nok Nok adds a risk engine for FIDO driven authentication

    The addition of a risk engine to Nok Nok’s FIDO-driven Authentication Server further strengthens the way web service providers can authenticate the consumers they transact with.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  20. Digital Rights Management 2.0

    There nothing new about the need for digital rights management (DRM). However, what DRM tools are expected to achieve has changed over the last decade or so.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

What’s hot on Infosecurity Magazine?