Infosecurity Blogs

  1. Why Data Leaks Will Continue to Happen

    The release of sensitive information to the public by individuals who are sometimes called whistleblowers and dubbed traitor or hero, is termed to be a data leak.

    1. Photo of Muhammad Suleman

      Muhammad Suleman

      Senior Information Security Consultant

  2. How to Run Effective Phishing Assessment and Training Campaigns Employees Don’t Hate

    The 11 best ways to conduct a successful phishing assessment process.

    1. Photo of Eyal Benishti

      Eyal Benishti

      CEO of IronScales

  3. #MayThe4thBeWithYou : The Insider Threat Awakens

    Spoiler alert: If you are one of the few people in the galaxy who haven’t seen the movie yet, you may want to hold off on reading this.

    1. Photo of Paul Drapeau

      Paul Drapeau

      Principal Security Researcher, Confer

  4. We Cannot Fight DDoS Attacks With Our Eyes Closed

    When dealing with a DDoS attack, it can be challenging to determine whether your website is down due to legitimate traffic volumes or because of an attack. Unfortunately, businesses are unable to simply check to see if all the traffic is coming from one IP address because of the nature of DDoS attacks whereby traffic comes from multiple sources.

    1. Photo of Paul Heywood

      Paul Heywood

      EMEA MD at Dyn

  5. Five Recommendations for Smarter Security Operations

    The impact of smarter resource allocation will continue to be a major factor for the cyber security function as the gap between supply of talent and the demand for more mature programs grows.

    1. Photo of Francis Ofungwu

      Francis Ofungwu

      Director, Information Security - Office of the CISO

  6. Fighting Account Takeovers with Cloud Intelligence

    From a defensive point of view, examining a single transaction initiated with stolen credentials to a single web application will return an inconclusive insight, so therefore taking preventive action on that transaction becomes a risky decision.

    1. Photo of Or Katz

      Or Katz

      Security researcher at Akamai, Akamai

  7. Give Your System a Security Checkup

    You need to do a regular (preferably quarterly) cybersecurity checkup that handles every aspect of your network and system.

    1. Photo of Jen  Martinson

      Jen Martinson

      Editor-in-Chief, Secure Thoughts

  8. Fighting Account Takeovers with Cloud Intelligence

    Visitors to highly-secured web applications create login credentials and then recycle those credentials to access another potentially vulnerable web application.

    1. Photo of Or Katz

      Or Katz

      Security researcher at Akamai, Akamai

  9. Testing Anti-Malware Support

    Product support - a less-frequently tested aspect of security.

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  10. The Cloud is the New 'Third Place', but Security Needs to Keep Pace

    If we are going to really reap the benefits of the cloud as a 'third space' its security has to be improved.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  11. User and Entity Behavior Analytics is Just One Piece of the Insider Threat Puzzle

    User and entity behavior analytics (UEBA) has quickly become a crowded space. CISOs are overwhelmed by vendors promising UEBA as the key to combatting insider threats when in reality it’s “a” key not “the” key.

    1. Photo of Feris Rifai

      Feris Rifai

      CEO and Co-Founder of Bay Dynamics

  12. Your Money or Your Data? Mitigating Ransomware with Dropbox

    Ransomware is designed to scare you into parting with money to avoid losing your data; there is no reason that either should happen. Traditional anti-virus and cloud storage services such as Dropbox form part of an effective mitigation strategy.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  13. What Apple Vs. The FBI Can Teach Us About Cloud Storage Security

    The recent Apple vs. FBI debate hit close to home for the cloud community because it touched on one of the industry’s hottest topics: data security.

    1. Photo of John Taylor

      John Taylor

      Chief Technology Officer, Panzura

  14. Five Ways to Improve Security and Increase Collaboration

    With mass migration from business in brick-and-mortar to the ‘wild’ World Wide Web, there are bound to be some growing pains.

    1. Photo of Dave Lenoe

      Dave Lenoe

      Director of Secure Software Engineering at Adobe

  15. $100 Million Bank Heist Brought to Light by “Fandation”

    Financial institutions in the Middle East are deeply concerned about their cyber-presence, as cyber-attacks have escalated over a period of very short time.

    1. Photo of Muhammad Suleman

      Muhammad Suleman

      Senior Information Security Consultant

  16. Why Healthcare must Adapt Information Security to Mobile

    In 1996, the Health Insurance Portability and Accountability Act, or HIPAA, was enacted in order to combat the rise in healthcare-related security attacks - studies uncovered that 80% of executives at healthcare providers and insurers have been hit by a cyber-attack, while the healthcare industry in general is 200% more likely to suffer from an attack than other sectors.

    1. Photo of Omri Sigelman

      Omri Sigelman

      Co-founder and CMO of Nuro Secure Messaging

  17. Guess Who's Accessing Your Network?

    The relentless news of security breaches is merely proof that organizations are fighting a constant battle to keep their data safe from phishing, hacks and identity theft.

    1. Photo of Darren Gross

      Darren Gross

      Director EMEA

  18. The Dark Web – Is it All Bad?

    The internet as we know it today cannot easily be split into 'right and wrong' with history showing us just as many bad things happen on the standard net as on the Dark Web

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  19. Akamai takes on Distil Networks in bot control

    Bad bots are used for all sorts of activities including brute force login attempts, online ad fraud (creating false clicks), co-ordinating man-in-the-middle attacks, scanning for IT vulnerabilities that attackers can exploit and clustered as bot-nets to perpetrate denial of service attacks.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  20. How to Deal with the Blind Spots in Your Security Created by Encrypted Traffic

    The top five most common network traffic inspection errors made today.

    1. Photo of Robert Arandjelovic

      Robert Arandjelovic

      Director of Product Marketing, Americas, Symantec

What’s hot on Infosecurity Magazine?