Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

The Rise of the Security Developer

The Rise of the Security Developer

With security developers on the team, businesses suddenly have the skills to tune integrations to their unique needs

Security Operations – Technology and Architecture

Security Operations – Technology and Architecture

The reliance on a SOC as a means of defensive capability is paramount

Interview: Conor Cronin and James Mullen, Edgescan

Interview: Conor Cronin and James Mullen, Edgescan

Infosecurity talked with Edgescan's new recruits about internships, opportunities and getting a job in cybersecurity

Understanding and Managing Third Party Vendor Risk

Understanding and Managing Third Party Vendor Risk

Businesses now must also diligently evaluate the security policies and procedures of third party vendors

Data Security Lessons from Recent Anti-Virus Companies’ Breaches

Data Security Lessons from Recent Anti-Virus Companies’ Breaches

Even the providers of endpoint security are vulnerable to attack

How Advancements in Technology Are Fraught With Privacy Policies

How Advancements in Technology Are Fraught With Privacy Policies

Technological advancements have produced enormous benefits for our society

#HowTo Do a Cybersecurity Interview

#HowTo Do a Cybersecurity Interview

How should you prepare as a recruiter in the cybersecurity space

Data Privacy and Security: Why Mobile Apps are the New Weak Link

Data Privacy and Security: Why Mobile Apps are the New Weak Link

Mobile apps are the new weak link when it comes to user data and privacy abuse

DDoS Botnets are Back and Poised to Do Damage

DDoS Botnets are Back and Poised to Do Damage

To lessen the threat of botnets, it's critical for users to be more conscious of their own security

Geopolitical Cyber Threats and Business Operations

Geopolitical Cyber Threats and Business Operations

Cyber-attacks can be easily cross-continentally conducted by a small number of personnel in contrast to conventional warfare

Interview: Kimberly Sharpe, SecOps Institute Student

Interview: Kimberly Sharpe, SecOps Institute Student

How SecOps Cyber Institute is aiming to train students in the human intelligence specialty

What’s Hot on Infosecurity Magazine?