Infosecurity Blogs
Infosecurity Magazine’s Top Stories 2022
Take a look at Infosecurity’s most-read stories of 2022 in this top 10 run-down
The Top Security Vulnerabilities of 2022 and Their Workarounds
Harman Singh outlines the top security vulnerabilities organizations should be aware of from 2022
New Year, New Problems: Why 2023 Could be Another Turbulent Time for Cybersecurity
Adenike Cosgrove sets out her cybersecurity predictions for 2023
Cybersecurity: Trends From 2022 and Predictions For 2023
This review of 2022 examines remote working, supply chain security and regulations
DDoS Activity Intensifies in Asia Pacific
As DDoS attacks rise in the region, StormWall opens a point of presence in Singapore
How to Recover Exchange Server After Total Failure
Find out how a proactive approach can help you overcome an Exchange Server failure
Why the Holidays are the Most Wonderful Time of the Year for Fraudsters
Just like manufacturers and e-commerce stores, threat actors ready themselves for the busiest time of the year
Top Three Things Organizations Need to Stay Secure in 2023
In this article, Jamf lists three important aspects of solving the security puzzle
DDoS Attacks in 2022: Trends and Obstacles Amid Worldwide Political Crisis
Ramil Khantimirov, CEO and co-founder StormWall, shared his views on the global trends affecting DDoS attacks
#BlackFriday: Preparing for Online Shopping Scams This Holiday Season
Javvad Malik highlights the types of scams consumers should be looking out for this year's holiday shopping season
Template Injection Attacks: Protecting Against Camouflaged URLs
Organizations can no longer rely on traditional security tools to protect against advanced threats
The Enemy Has Deep Pockets: How safe are your user accounts?
Understand the latest techniques bot operators are using to bypass traditional detection methods and what to do to avoid falling victim to an attack
How to be Mindful of Security Threats During the FIFA World Cup
How are cyber-attackers likely to target the upcoming FIFA football world cup, and how can these threats be mitigated?
Solving the Cybersecurity Permacrisis
Enterprises that make the time and space for their security staff to learn will achieve much higher levels of security
How Schools Can Become Cyber Resilient in 2023
Threat actors continue to target schools and the data they hold. This article provides advice and tips on how they cany protect themselves from an attack.
Microsoft 365 Apps Continue to be the Most Exploited Cloud Services
As attacks on cloud applications grow, it is essential that businesses gain greater visibility over their cloud infrastructure
Data Protection is the Heart of Zero Trust, Forrester Reports
Fasoo's Ron Arden analyses Forrester's latest report, The Definition of Modern Zero Trust
Protecting Your Business as DDoS Attacks Set to Surge
From politically motivated efforts to ransom extortion, nobody is safe from getting hit by a DDoS attack.
ID Authentication Bypass and the Next Evolution in Phishing Campaigns
New insights highlight the sophistication of modern phishing packages available to budding fraudsters
The Increasingly Complex Threat Landscape Must Be Fought With Simplicity
New research shows that 65% of UK and US CI organizations have fallen victim to a cyber-attack