Infosecurity Blogs

  1. Come Spy with Me: Drones and Info-Sec

    As drone use increases, new challenges are emerging with regard to privacy and information security.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  2. Repetition is (The) Key

    Education and awareness will go a long way in protecting your business against many types of cybercrime. But creating a risk-conscious workplace is easier said than done. Of course, the first step in making your staff aware of possible threats is training. But how much of this training do you remember months or even years later?

    1. Photo of Frits Vos

      Frits Vos

      CIO at Netpresenter

  3. Working With Giants – 25 Years of IT Security

    Symantec's June 2016 announcement that it intends to buy Blue Coat mirrors Trend Micro's acquisition of Tipping Point in 2015. Both moves underline that there is an appetite for integrated offerings from the broad play security giants.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  4. Getting Serious About Thwarting Cyber-Criminals

    The theory behind protecting company sensitive information from attackers has not changed much in close to two decades, yet a shocking number of organizations still deploy inadequate defences.

    1. Photo of Chris Pogue

      Chris Pogue

      head of strategic alliances, Nuix

  5. Why Sharing, Not Secrecy, Can be Better for Security

    GDPR requires organizations to document publicly the fact that they have experienced a breach and the extent of it, at the time it occurred.

    1. Photo of Udi Mokady

      Udi Mokady

      President and CEO, CyberArk

  6. UK's Most Innovative Small Cyber Security Company Named at #Infosec16

    It is great to see new companies entering the industry and after covering the Innovation Sandbox at RSA Conference earlier this year, I was very interested to see Infosecurity Europe follow suit with a session “UK's Most Innovative Small Cyber Security Company of the Year: Competition Final”.

  7. Fixing the UK’s Ransomware Problem

    Prevention is always better than cure, but the state of the UK’s businesses when it comes to shoring up user security is shockingly poor, which is extremely worrying when the threat is growing.

    1. Photo of François Amigorena

      François Amigorena

      Founder and CEO, IS Decisions

  8. Ten Compelling Reasons to Improve Security when Harnessing the Power of Desktop Virtualization

    10 tips to help you assert control over enterprise mobility while ensuring compliance and security.

    1. Photo of Kevin Patel

      Kevin Patel

      Service Assurance Technology Analyst at Xangati

  9. Nine Steps to The GDPR

    Here are some the steps organizations can take to stay ahead of the reforms taking effect in 2018.

    1. Photo of Colman Morrissey

      Colman Morrissey

      Managing Director, BSI Espion

  10. Persuading Employees They Are Your Organization’s First Line of Defence

    What is less well known is how to turn employees into a company’s strongest line of defense.

    1. Photo of Chris Barrington

      Chris Barrington

      Managing Director at Blue Goose

  11. Traditional Security Tools Fail Against Modern-Day Threats

    What can companies do to implement a holistic security infrastructure that defends against evolving, modern-day threats?

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  12. The Nature of Camouflage

    PowerShell is an example of a native tool that can be utilized to infiltrate a company.

    1. Photo of Nick Palmer

      Nick Palmer

      TrapX Security

  13. First the IP Bill, Then What?

    It seems that with regrettable flippancy, the Investigatory Powers Bill will be passed later this year.

    1. Photo of Jacob Ginsberg

      Jacob Ginsberg

      Senior Director, Echoworx

  14. Threat Intelligence - The Answer to Threats or Another Fad?

    The threat landscape has been dynamic and ever changing, and the growth and rapid advancement in cyber-attacks against enterprises and individuals have rendered traditional cyber-security measures virtually obsolete.

    1. Photo of Jyothi  Babu Thummala

      Jyothi Babu Thummala

      Director of Security Solutions - Infrastructure & Security Business at Happiest Minds Technologies

  15. The Overlooked Elements of InfoSec: Solving the Unknown Unknowns

    If there’s a golden rule around InfoSec, it probably amounts to “you have to know what exists on your network to effectively protect it.”

    1. Photo of Peter Martini

      Peter Martini

      President of, iBoss

  16. How Information Resilience can Help Businesses Secure Their Place in Tomorrow’s Supply Chain

    The proper protection of a business’ digital information is a growing concern, and one that must be addressed to ensure the long-term prosperity of an organization.

    1. Photo of Toni Allen

      Toni Allen

      UK Head of Client Propositions at BSI

  17. Why Preventing Rooting and Jailbreaking is so Important

    Although rooting and jailbreaking are technically different processes on different platforms, the end-goal is the same.

    1. Photo of Alex Manea

      Alex Manea

      CSO, BlackBerry

  18. Why Employees Are Taxing Your Cyber Security Team’s Patience

    Tax season shouldn’t put an undue burden on the IT team.

    1. Photo of Bradon Rogers

      Bradon Rogers

      SVP Product Strategy and Operations at Blue Coat‬

  19. IT Untethered – How Wireless is Changing the World

    Wi-Fi started out as way to make local area networks easier to deploy. Now, coupled with cellular networks, the rise ubiquitous mobility and the IoT, wireless is changing the world and there are security issues to consider.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  20. Securing the Connected Organization

    Victoria Windsor, Content Manager for Infosecurity Europe, looks at the challenges businesses face to secure their connected enterprise in 2016

    1. Photo of Victoria Windsor

      Victoria Windsor

      Content Manager, Infosecurity Magazine

What’s hot on Infosecurity Magazine?