Infosecurity Blogs

  1. How to Fix SQL Server Recovery Pending Error

    Learn about the SQL Server Recovery Pending error, how to check it, and how to avoid this issue

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  2. How to Identify and Respond to a DDoS Network Attack

    Three tips to help you set up your on-premises DDoS technology and prepare your team to efficiently recognize and mitigate a DDoS attack.

    1. Photo of Ziv Gadot

      Ziv Gadot

      Founder and CEO, Red Button

  3. Governments Under Attack: Examining a New PureCrypter Campaign

    Brett Raybould highlights a surge in attacks targeting the public sector, including one malware specifically designed for this purpose

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA Solutions Architect, Menlo Security

  4. A Brief History of Windows Vulnerabilities: The Evolution of Threats and Security

    Understanding the evolution of Windows vulnerabilities and security is crucial in protecting your devices and data from cyber threats

    1. Photo of Tristan  Gilmour

      Tristan Gilmour

      Incident Response Manager, Easygo

  5. Crafting Scams with AI: a Devastating New Vector

    Powerful AI tools will soon be accessible to cyber-criminals, enabling the industrial automation of cyber-attacks

    1. Photo of Raef  Meeuwisse

      Raef Meeuwisse

      CISM, CISA, Author of Cybersecurity for Beginners

  6. How to Backup and Restore Database in SQL Server

    Find out why it is important to have a back up and how to create a full backup using SSMS

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  7. How Cyber-Criminals are Circumventing Multifactor Authentication

    Cyber-criminals are exploiting MFA weaknesses, and it should no longer be seen as a 'silver bullet' against account takeover, says Adenike Cosgrove

    1. Photo of Adenike Cosgrove

      Adenike Cosgrove

      Cybersecurity Strategist at Proofpoint, Proofpoint

  8. Why You Don’t Need 300 Gbps DDoS Simulation Tests

    Did you read about the 300Gbs DDoS attack last week? We must test our protection against an attack of that size

    1. Photo of Ziv Gadot

      Ziv Gadot

      Founder and CEO, Red Button

  9. Will ChatGPT Democratize the Development of Evasive Malware?

    Menlo Security's Brett Raybould outlines the potential cyber-threats posed by ChatGPT

    1. Photo of Brett Raybould

      Brett Raybould

      EMEA Solutions Architect, Menlo Security

  10. How to Migrate OST to Microsoft 365

    The recent Hostage Exchange Server outage is one example where the users didn’t have access to the Exchange EDB files on cloud servers and they restored mail items from the OST file

    1. Photo of Bharat  Bhushan

      Bharat Bhushan

      Technical Marketer, Stellar Data Recovery

  11. The Impact of Conversational AI on the GRC Workforce: Training our Next Generation Workers

    Jenai Marinkovic and colleagues discuss the importance of teaching cybersecurity and GRC workers how to work alongside AI systems

    1. Photo of Nicholas Brown

      Nicholas Brown

      security analyst, GRCIE

    2. Photo of Amanda Lyking

      Amanda Lyking

      security analyst, GRCIE

    3. Photo of Jenai Marinkovic

      Jenai Marinkovic

      Executive Director, CISO, Advisory Board - GRC for Intelligent Ecosystems Foundation

    4. Photo of Rashida Thomas

      Rashida Thomas

      security analyst, GRCIE

    5. Photo of Todd Williams

      Todd Williams

      security analyst, GRCIE

  12. #IWD2023: Retaining and Advancing Women in the Cyber Security Industry: Moving from Theory to Impact by Measuring Inclusion

    Women in Cybersecurity has launched a study to measure the state of inclusion of women in cybersecurity

    1. Photo of Katherine Hutton

      Katherine Hutton

      Ambassador, Women in Cybersecurity UK Affiliate

    2. Photo of Zoe  Mackenzie

      Zoe Mackenzie

      VP, Women in Cybersecurity UK Affiliate

What’s hot on Infosecurity Magazine?