Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

Sensible Ways to Use Cyber Risk Ratings, Despite Methodological Shortcomings

Sensible Ways to Use Cyber Risk Ratings, Despite Methodological Shortcomings

Cyber risk ratings, though attractive as a concept, are constrained by methodological shortcomings. Despite this, they can be a useful instrument helping to generate valuable insights for decision-making.

Interview: Charlie Hosier, 2018 Cyber Security Challenge Winner

Interview: Charlie Hosier, 2018 Cyber Security Challenge Winner

Charlie Hosier, winner of the 2018 Cyber Security Challenge, talks to Infosecurity about his career aspirations and experience so far

Business Continuity/Disaster Recovery - Hoping for the Best, Prepared for the Worst, and Unsurprised by Anything in Between

Business Continuity/Disaster Recovery - Hoping for the Best, Prepared for the Worst, and Unsurprised by Anything in Between

What a member of the IT team learned from participating in business continuity/disaster recovery drills.

Using Offender Profiling Techniques in Security Operations

Using Offender Profiling Techniques in Security Operations

How offender profiling techniques can help you be more preemptive in detection and prevention.

Lessons from League of Legends Part 2: Focusing on the Goal

Lessons from League of Legends Part 2: Focusing on the Goal

How playing League of Legends taught a valuable lesson on rookie mistakes.

What is the Evolving Role of Ethical Hackers in the New Age of Cybersecurity?

What is the Evolving Role of Ethical Hackers in the New Age of Cybersecurity?

There are still challenges that ethical hackers face, including certifications and legal problems.

It’s Time for your First Security Conference

It’s Time for your First Security Conference

Are you ready to get in the social mood, or do some learning at your first conference?

Why Data Breaches are all About Trust

Why Data Breaches are all About Trust

When it comes to computer security, we require trust more than most.

Ensuring the UK Cybersecurity Profession Retains a Hotbed of Talent

Ensuring the UK Cybersecurity Profession Retains a Hotbed of Talent

We need to hire efficiently, create champions in the workplace and look at how cybersecurity qualifications are designed

Influence of Artificial Intelligence and Machine Learning in Cybersecurity

Influence of Artificial Intelligence and Machine Learning in Cybersecurity

Why AI and Machine Learning are reflective of the predicted advancements in IT.

Creating Your Perfect Big Data Engineer Resume

Creating Your Perfect Big Data Engineer Resume

How to craft the ultimate Big Data engineer resume, and get the job.

What’s Hot on Infosecurity Magazine?