Infosecurity Blogs

  1. Biometrics: the New Frontier in Security, but Why Aren’t We There Yet?

    Biometrics is often considered to be the cutting-edge technology that the security industry needs to adopt to help drive innovation in the digital age

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  2. #ISC2Congress: How to Hire and Get Hired in Infosec

    The session contained a lot of really useful insight and advice on how to hire, and get hired, in information security.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  3. #ISC2Congress: How to Mentor an Information Security Professional

    Jeff Silver, senior security engineer at RSA corporation, gave a talk at (ISC)2 Congress in Orlando, Florida, on how to build up infosec professionals through mentoring programs.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  4. #CLOUDSEC2016 : Tenacity and Problem-solving Trump CISSP, says Rik Ferguson

    At CLOUDSEC in London on 6 September 2016, Rik Ferguson, VP president security research, Trend Micro, presented in a session titled ‘Take Control: Empower the People’

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  5. How Businesses Can Combat Cybercrime and Win the 'Cyberwar'

    Data protection and security concerns around mobile devices are two serious cybercrime issues businesses both large and small must realize, while already happening today, are going to become even more prevalent tomorrow

    1. Photo of Bertrand Liard

      Bertrand Liard

      Partner, White & Case

  6. Gotta Hack em’ All: Pokémon Go, Security and Privacy Awareness

    The Pokémon Go incident served as a litmus test of where the average person stands in terms of their security and privacy awareness

    1. Photo of Alvaro Hoyos

      Alvaro Hoyos

      Chief Information Security Officer, OneLogin

  7. Top Tips to Keep the Hackers at Bay

    What was once a couple of physical doors that kept your office safe is now a multitude of virtual doors that you can’t control

    1. Photo of Simon Williams

      Simon Williams

      Business Technology Strategist, Pro Drive IT

  8. There's No David vs Goliath in Cybersecurity Innovation

    Cybersecurity needs new and radical approaches, as well as rethinking and re-engineering. This is tough for established organizations to take on board and put into practice, but it’s exactly what start-ups do best

    1. Photo of Richard  Wilding

      Richard Wilding

      Director of New Ventures, BAE Systems Applied Intelligence

  9. As Hackers Target US Election, Onus is on Security Pros to Protect Data

    The possibility of hackers using malicious, electronic means to interfere with the election process marks a game changer for information security professionals

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. In Cybersecurity Hiring, Aptitude Trumps Experience and Skills

    As a hiring manager, you may be presented with a choice: hire the candidate with the most experience or a natural ability to get things done. While tenure is the indicator of expertise in many careers, the case can be made for hiring based on aptitude versus experience in cybersecurity

    1. Photo of Nathan Burke

      Nathan Burke

      VP of Marketing, Hexadite

  11. #BHUSA Dropped USB Experiment Detailed

    Earlier this year, a whitepaper was released which revealed the results of an experiment where malicious USB sticks were dropped around the campus of the University of Illinois.

  12. A Day in the Life of an IT Pro: Hacked off with IoT

    I know the topic of connected fridges and the like is often covered, but amid the cacophony of excited consumers is a warning – the impact of IoT on enterprise security could be monumental.

    1. Leon Adato

      Head Geek at, SolarWinds

  13. SentinelOne Financially Guarantees Ransomware Recovery

    Endpoint security vendor SentinelOne has announced a cyber-threat “protection guarantee” that will provide customers with financial protection in the event of ransomware attacks on their networks

  14. Why IT Service Desk Should be your First Line of Defence

    In a world of zero day vulnerabilities and advanced persistent threats, it is the Service Desk, coupled with a layered approach of patch management and application control, which must provide a vital first line of defense against industrial hackers.

    1. Photo of Roberto Casetta

      Roberto Casetta

      International Senior Vice President & GM at Heat Software

  15. Ransomware Holds Your Data Hostage. Here’s How to Stop It

    Finding yourself in a situation where your data is held hostage can be an intensely frustrating experience for individuals and businesses.

    1. Photo of DJ Singh

      DJ Singh

      Digital Architect at Wipro Digital

  16. Steelcon - When Hackers Went North

    Describing itself as a hacker con “with a northern edge”, the conference welcomed some leading lights from the UK information security scene and after seeing its growth and an impressive 2015 from afar, I was able to grab a ticket and get along to it

  17. Will Linking Executive Pay to Cybersecurity be the Wake-Up Call CEOs Need?

    CEOs who don’t work in the telecoms or IT sectors may not have paid much attention to the Culture, Media and Sport Committee’s investigation into cybersecurity, which was triggered by last October’s cyber-attack on TalkTalk. That might be a mistake.

    1. Photo of James Wickes

      James Wickes

      CEO and co-founder of Cloudview

  18. Banking on Security

    The financial services industry is evolving at a rapid rate. From shifting customer expectations to disruptive technology, it has had to redefine itself and now leads by shining example as a sector that is an expert at digital.

    1. Photo of Rob Norris

      Rob Norris

      Director of Enterprise & Cyber Security EMEIA at Fujitsu

  19. Cybersecurity - A Boardroom Blindspot

    Is cybersecurity on the agenda in your boardroom? In the most recent Cyber Governance Health Check it was found that 33% of boards have ‘clearly set and understood their appetite for cyber-risk’, up 18% from 2014.

    1. Photo of Bruce Penson

      Bruce Penson

      Managing Director, Pro Drive IT

  20. OASIS Summer Event: Red Teaming, Scorecarding and Endpoint Security

    This week the stylish venue of Ham Yard Hotel played host to the summer edition of the OASIS event, bringing together industry specialists to discuss and share their thoughts on some of the main talking points across the cybersecurity sector at the moment

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?