Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

Interview: Jenny Potts

Interview: Jenny Potts

How Jenny is aiming to make a difference in how we learn about coding in infosec

Counteracting File-Based Threats Using CDR Tech

Counteracting File-Based Threats Using CDR Tech

CDR works by assuming that all files are potentially infected

How Do You Protect Your Data Against Personalization?

How Do You Protect Your Data Against Personalization?

How to control the data social media companies hold about you

Interview: Damian Vavanos, Social Hackers Academy

Interview: Damian Vavanos, Social Hackers Academy

How one academy is aiming to bring cybersecuirty skills to the less privileged in society

Technological Innovations Defining the Future of Cybersecurity and the New Normal for Businesses

Technological Innovations Defining the Future of Cybersecurity and the New Normal for Businesses

What role new technologies could play in transforming traditional cybersecurity.

The Four Benefits of Data Mining: Google’s Side of the Data Story

The Four Benefits of Data Mining: Google’s Side of the Data Story

How much money do you make for Google by using their services?

Self-Sovereign Identities to Protect Future Social Media Platforms from Hacking

Self-Sovereign Identities to Protect Future Social Media Platforms from Hacking

The failure to do so will make the users become jittery about their privacy in the hands of the social media platforms and lose their confidence in them.

Interview: Taharka Beamon, SOC Manager, Reed Exhibitions

Interview: Taharka Beamon, SOC Manager, Reed Exhibitions

Infosecurity speaks to Taharka Beamon about the importance of keeping SOC staff happy and engaged in their jobs

Keeping Your Crypto Wallet Safe

Keeping Your Crypto Wallet Safe

A sure way to keep your crypto funds away from prying eyes and malevolent hands.

In the Wake of SIGRed, is Good-Enough DDI Still Good Enough?

In the Wake of SIGRed, is Good-Enough DDI Still Good Enough?

The choice that large enterprises have make on whether to accept ‘good-enough’ DDI.

Ransomware Adopts a Game-Changing Blackmail Model for Information Theft

Ransomware Adopts a Game-Changing Blackmail Model for Information Theft

Looking at ransomware types, how they operate and utilize double blackmail schemes.

Data Protection in the Wake of Deepfakes

Data Protection in the Wake of Deepfakes

Should deepfakes be classified as personal data?

What’s Hot on Infosecurity Magazine?