Infosecurity Blogs

  1. 5 Common Mistakes When Dealing with Security Stakeholders – and How to Avoid Them

    Managing an initiative as business-critical as cybersecurity means IT and security leaders need to work closely with various stakeholders to agree to the security strategy, put them at ease that it will work and give them confidence that it will be effective

    1. Photo of Yishai Beeri

      Yishai Beeri

      Director of Cybersecurity Research, CloudLock

  2. Everything You Need to Know About RDNH

    Every business needs to take great care with its domain name. This is the word or words you choose to form your website address, literally your identity on the world wide web

    1. Photo of Debbie Fletcher

      Debbie Fletcher

      Technology Journalist

  3. The Pitfalls of Awareness

    Dr Jessica Barker reveals the three pitfalls of security awareness

    1. Photo of The  Risk Avengers

      The Risk Avengers

      Information Security Consultancy

  4. #FutureDecoded Dreaming of Electric Employees

    If you believed that terms such as artificial intelligence (AI), machine learning and digital transformation were the stuff of science fiction, then other sections of IT are proving that this is the new reality.

  5. Mirai - How a Botnet Made IoT a Security Reality

    I’ve been hearing about IoT for a number of years, and it was not until 2013 until I understood what the concept was about, and sometime after that the term was more defined as the concept of connected devices became more of a reality.

  6. International Cybersecurity Regulation Needs to Become Standard

    Harshul Joshi, DarkMatter, explains why international cybersecurity regulation needs to become the standard now

    1. Photo of Harshul Joshi

      Harshul Joshi

      Senior Vice-president of Cyber Governance, Risk and Compliance, DarkMatter

  7. Roundtable: Former Deputy Director of NSA Talks Insider Threats

    Chris Inglis discusses the insider threat talking his experiences with the NSA, transparency and the use of behavior analytics

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  8. The Shape of Things to Come – Advanced Networking Security for IoT

    There are all sorts of potential for IoT-related applications to streamline business processes and provide new ways of interacting with customers.

  9. The Rise of DDoS in IOT

    Bryan Campbell, Fujitsu, explores the rise of DDoS in IoT

    1. Photo of Bryan Campbell

      Bryan Campbell

      Senior Security Researcher & Fujitsu Distinguished Engineer, Fujitsu UK & Ireland

  10. #ISC2CongressEMEA: The Monkey, The Human & The Cybersecurity Awareness Program

    When it comes to security training and awareness, the prime objective of many organizations is to be able to demonstrate that all staff have completed security awareness training.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  11. #ISC2CongressEMEA: Combined Mitigation for Cyber and Physical Attacks

    At the (ISC)2 Congress EMEA in Dublin on October 18 2016, Barrie Millett drew upon his experience from the military and his resilience roles at E.ON and GE to advise on combined mitigation for cyber and physical attacks.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  12. The Yahoo hack – a numbers game

    Have you got a Yahoo email account? Was it one of the 500 million accounts compromised by the breach disclosed by Yahoo in September 2016? Does it matter if it was?

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  13. Nok Nok adds a risk engine for FIDO driven authentication

    The addition of a risk engine to Nok Nok’s FIDO-driven Authentication Server further strengthens the way web service providers can authenticate the consumers they transact with.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  14. Digital Rights Management 2.0

    There nothing new about the need for digital rights management (DRM). However, what DRM tools are expected to achieve has changed over the last decade or so.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  15. Biometrics: the New Frontier in Security, but Why Aren’t We There Yet?

    Biometrics is often considered to be the cutting-edge technology that the security industry needs to adopt to help drive innovation in the digital age

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  16. #ISC2Congress: How to Hire and Get Hired in Infosec

    The session contained a lot of really useful insight and advice on how to hire, and get hired, in information security.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  17. #ISC2Congress: How to Mentor an Information Security Professional

    Jeff Silver, senior security engineer at RSA corporation, gave a talk at (ISC)2 Congress in Orlando, Florida, on how to build up infosec professionals through mentoring programs.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  18. #CLOUDSEC2016 : Tenacity and Problem-solving Trump CISSP, says Rik Ferguson

    At CLOUDSEC in London on 6 September 2016, Rik Ferguson, VP president security research, Trend Micro, presented in a session titled ‘Take Control: Empower the People’

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  19. How Businesses Can Combat Cybercrime and Win the 'Cyberwar'

    Data protection and security concerns around mobile devices are two serious cybercrime issues businesses both large and small must realize, while already happening today, are going to become even more prevalent tomorrow

    1. Photo of Bertrand Liard

      Bertrand Liard

      Partner, White & Case

  20. Gotta Hack em’ All: Pokémon Go, Security and Privacy Awareness

    The Pokémon Go incident served as a litmus test of where the average person stands in terms of their security and privacy awareness

    1. Photo of Alvaro Hoyos

      Alvaro Hoyos

      Chief Information Security Officer, OneLogin

What’s hot on Infosecurity Magazine?