Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

The Culture Shock of a Non-Profit Founder of a Women in Cybersecurity Group

The Culture Shock of a Non-Profit Founder of a Women in Cybersecurity Group

There has to be a deeper systemic connection between the perceptions of cybersecurity at the citizen level, in addition to its stead in our current school systems.

Adaptive Commensurate Response to Protect Cyber-Physical Systems

Adaptive Commensurate Response to Protect Cyber-Physical Systems

Current cyber-physical system protocols and applications allow significant changes to a system to take place within a short time or small network footprint, which can be exploited

Shielding Your Network from Dynamic Content Attacks

Shielding Your Network from Dynamic Content Attacks

How to defend against a CDN attack, and how they are orchestrated.

Penetration Testers in the Cloud

Penetration Testers in the Cloud

Even in the cloud, penetration testers can be the right people to identify the enterprise’s surface, complexity, and cyber weaknesses.

Hardware Security Revisited

Hardware Security Revisited

Hardware is no less vulnerable to attack than any other system because hardware is an often overlooked piece of the security puzzle.

Interview: Aimee Laycock, COO, CLTRe

Interview: Aimee Laycock, COO, CLTRe

Understanding that your company has a security culture is one thing, but what do you do with the data?

Why e-PHI Lies at the Heart of Any Good HIPAA Strategy

Why e-PHI Lies at the Heart of Any Good HIPAA Strategy

What do IT vendors need to do to safeguard electronic protected health information?

Beyond the 11%: How Women Can Bridge the Cybersecurity Talent Gap

Beyond the 11%: How Women Can Bridge the Cybersecurity Talent Gap

It is logical, practical and necessary to tap into women, and the skills we bring, to help fill the skills gap.

Cybersecurity's Challenge is to Attract More Women

Cybersecurity's Challenge is to Attract More Women

The issue is surely not about the gender of the people in the industry, but how we prepare ourselves for any circumstances that we find ourselves in.

Five Ways to Write a Robotics Engineer Resume that Gets Noticed

Five Ways to Write a Robotics Engineer Resume that Gets Noticed

Five ways to write a robotics engineer resume that gets noticed.

Is it OK to Reward Those Who Flag the Phish and Highlight Those Who Failed?

Is it OK to Reward Those Who Flag the Phish and Highlight Those Who Failed?

If you socially engineer your employees, is it right to reward those who flag the phish and highlight those who failed - or vice versa?

Your Gov Needs You To Help Develop the UK Cybersecurity Profession

Your Gov Needs You To Help Develop the UK Cybersecurity Profession

Consultation has begun on a new Government-sponsored cybersecurity profession standard.

What’s Hot on Infosecurity Magazine?