Infosecurity Blogs

  1. Infosecurity Magazine’s Top Stories 2022

    Take a look at Infosecurity’s most-read stories of 2022 in this top 10 run-down

  2. The Top Security Vulnerabilities of 2022 and Their Workarounds

    Harman Singh outlines the top security vulnerabilities organizations should be aware of from 2022

    1. Photo of Harman Singh

      Harman Singh

      Security Expert and Consultant

  3. New Year, New Problems: Why 2023 Could be Another Turbulent Time for Cybersecurity

    Adenike Cosgrove sets out her cybersecurity predictions for 2023

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  4. Cybersecurity: Trends From 2022 and Predictions For 2023

    This review of 2022 examines remote working, supply chain security and regulations

    1. Photo of Joel Burleson-Davis

      Joel Burleson-Davis

      SVP Worldwide Engineering, Cyber, Imprivata

  5. DDoS Activity Intensifies in Asia Pacific

    As DDoS attacks rise in the region, StormWall opens a point of presence in Singapore

    1. Photo of Ramil Khantimirov

      Ramil Khantimirov

      CEO and co-founder of StormWall

  6. How to Recover Exchange Server After Total Failure

    Find out how a proactive approach can help you overcome an Exchange Server failure

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  7. Why the Holidays are the Most Wonderful Time of the Year for Fraudsters

    Just like manufacturers and e-commerce stores, threat actors ready themselves for the busiest time of the year

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  8. Top Three Things Organizations Need to Stay Secure in 2023

    In this article, Jamf lists three important aspects of solving the security puzzle

    1. Photo of Aaron Webb

      Aaron Webb

      Senior Product Marketing Manager, Security, Jamf

  9. DDoS Attacks in 2022: Trends and Obstacles Amid Worldwide Political Crisis

    Ramil Khantimirov, CEO and co-founder StormWall, shared his views on the global trends affecting DDoS attacks

  10. #BlackFriday: Preparing for Online Shopping Scams This Holiday Season

    Javvad Malik highlights the types of scams consumers should be looking out for this year's holiday shopping season

    1. Photo of Javvad Malik

      Javvad Malik

      Security Awareness Advocate, KnowBe4

  11. Template Injection Attacks: Protecting Against Camouflaged URLs

    Organizations can no longer rely on traditional security tools to protect against advanced threats

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA SE Manager, Menlo Security

  12. The Enemy Has Deep Pockets: How safe are your user accounts?

    Understand the latest techniques bot operators are using to bypass traditional detection methods and what to do to avoid falling victim to an attack

    1. Photo of Antoine  Vastel, PhD

      Antoine Vastel, PhD

      VP of Research, DataDome

  13. How to be Mindful of Security Threats During the FIFA World Cup

    How are cyber-attackers likely to target the upcoming FIFA football world cup, and how can these threats be mitigated?

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  14. Solving the Cybersecurity Permacrisis

    Enterprises that make the time and space for their security staff to learn will achieve much higher levels of security

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  15. How Schools Can Become Cyber Resilient in 2023

    Threat actors continue to target schools and the data they hold. This article provides advice and tips on how they cany protect themselves from an attack.

    1. Photo of Kylie  Ruiz

      Kylie Ruiz

      Senior Product Marketing Manager, Secure Link

  16. Microsoft 365 Apps Continue to be the Most Exploited Cloud Services

    As attacks on cloud applications grow, it is essential that businesses gain greater visibility over their cloud infrastructure

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  17. Data Protection is the Heart of Zero Trust, Forrester Reports

    Fasoo's Ron Arden analyses Forrester's latest report, The Definition of Modern Zero Trust

    1. Photo of Ron Arden

      Ron Arden

      Executive Vice President, CTO and COO, Fasoo

  18. Protecting Your Business as DDoS Attacks Set to Surge

    From politically motivated efforts to ransom extortion, nobody is safe from getting hit by a DDoS attack.

    1. Photo of Ramil Khantimirov

      Ramil Khantimirov

      CEO and co-founder of StormWall

  19. ID Authentication Bypass and the Next Evolution in Phishing Campaigns

    New insights highlight the sophistication of modern phishing packages available to budding fraudsters

    1. Photo of Jason Steer

      Jason Steer

      CISO, Recorded Future

  20. The Increasingly Complex Threat Landscape Must Be Fought With Simplicity

    New research shows that 65% of UK and US CI organizations have fallen victim to a cyber-attack

    1. Photo of Dan Turner

      Dan Turner

      VP for Forcepoint G2CI, Forcepoint

What’s hot on Infosecurity Magazine?