Infosecurity Blogs

  1. RIG EK Dropping TrickBot Trojan & Madness/Quant Loader DoS Bot

    As the exploit market begins to diversify, it has seen the introduction of new threats, the most recent being the inclusion of a relative new comer in TrickLoader and an older threat known as TrickBot

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  2. DaaS, VDI, and the Changing World of the Desktop

    This brave new world has even seen significant changes in the way that desktops are delivered, with DaaS (desktop as a service) and VDI (virtual-desktop infrastructure) becoming a more pressing need for modern business.

    1. Photo of Mav Turner

      Mav Turner

      Director, IT Security Business, SolarWinds

  3. On the 12th Day of Christmas, the Industry Predicted…a Skills Gap Challenge

    Experts have their say on what they expect the cybersecurity skills scene to be like in 2017

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  4. On the 11th Day of Christmas, the Industry Predicted…Better Security Collaboration

    2017 could be the year we see collaborative security come into fruition like never before

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  5. On the Tenth Day of Christmas, the Industry Predicted…Cloud Vendor Compromise

    Experts predict that a major cloud vendor will be in the news for suffering a significant security breach

  6. Deck the Halls With...Cybersecurity Awareness

    The Risk Avengers have written a Christmas song especially for the Infosecurity Magazine readers.

    1. Photo of The  Risk Avengers

      The Risk Avengers

      Information Security Consultancy

  7. On the Ninth Day of Christmas, the Industry Predicted…GDPR Compliance

    Of course this is a 2017 prediction and I’m well aware that the General Data Protection Regulation (GDPR) does not come into force until 25th May 2018, but with 526 days to go, 2017 is the final full calendar year to achieve compliance and predictions seen by Infosecurity show that it is a case of now or never for your preparations

  8. On the Eighth Day of Christmas, the Industry Predicted…Attackers Making Money

    In our eighth prediction, we will take a look at the miscreant attackers and predictions on what they will be up to in 2017, and how they will find ways to make more money.

  9. On the Seventh Day of Christmas, the Industry Predicted…More Mention of AI

    The concept of machine learning, automation and artificial intelligence (AI) have got a lot of attention over the past couple of years, and it is predicted that this will continue into 2017

  10. On the Sixth Day of Christmas, the Industry Predicted…a Big Year for IoT

    Internet of Things (is a topic keeping the minds of a lot of specialists busy, with numerous envisaging it to play a major role next year

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  11. On the Fifth Day of Christmas, the Industry Predicted…More Social Media Attacks

    Social media and networking sites will be prime attack targets in 2017, each carrying its own set of risks

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  12. Dridex Targets Scotland

    Dridex recently targeted victims using a football lure in an attempt to deliver the malicious trojan

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  13. On the Fourth Day of Christmas, the Industry Predicted…CIOs to Reclaim Ownership of Data Initiatives

    2017 could be the year in which CIOs will secure their future by reclaiming ownership of data initiatives

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  14. On the Third Day of Christmas, the Industry Predicted…More Political Disruption

    Experts warn nation states and their sponsored operatives will use cyber espionage more and more next year to cause political shifts, disruption and to gain economic advantage

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  15. On the Second Day of Christmas, the Industry Predicted…Poor Routine IT Practices

    Poor routine IT practices will cause the most avoidable harm to businesses next year

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  16. On the First Day of Christmas, the Industry Predicted...MORE RANSOMWARE

    As 2016 draws to a close, what lessons can be drawn from a year that was immersed in cybersecurity controversy and headline-making news, and what predictions can be made about what we expect to face in 2017?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  17. Trading in Compromised Remote Desktop Services

    There is a criminal underworld of compromised services in existence on dark web forums

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  18. ‘We'll Always Have Paris’ – Highlights from ISSE Conference 2016

    This week the beautiful city of Paris played host to the 17th annual ISSE Conference, bringing together a raft of security professionals and experts from around the world to discuss, debate and shape the future of digital identity

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  19. Closing the Gender Gap in Cybersecurity: Its Time to Back Ourselves as an Industry

    Cybersecurity is facing a frightening skills gap, so to put it simply, we need more people, so we need more women

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  20. Assessing the Cost of Brexit from a Cybersecurity Standpoint

    The cybersecurity community is equally looking to assess the impact of Brexit

    1. Harshul Joshi

      Senior Vice President of Cyber Governance, Risk and Compliance, DarkMatter

What’s hot on Infosecurity Magazine?