Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

Are Companies Ready to Implement GDPR-compliant Data Protection?

Are Companies Ready to Implement GDPR-compliant Data Protection?

If you're like most businesses, then your GDPR experience will come down to whether you can anticipate the subtle nuances of regulatory adoption.

Should We Fear North Korea's Cyber Army?

Should We Fear North Korea's Cyber Army?

The North Korean regime is suspected to be exploiting its cyber weapons for political purposes to intimidate its opponents as well as to steal crypto-currency.

The Cybersecurity Skills Shortage: What can Organizations Do to Tackle it?

The Cybersecurity Skills Shortage: What can Organizations Do to Tackle it?

What is the cybersecurity skills gap, and what is needed to resolve it?

Building a Cybersecurity Profession

Building a Cybersecurity Profession

Why education is at the heart of solving the cybersecurity skills gap.

Interview: Marcin Kleczynski, Malwarebytes

Interview: Marcin Kleczynski, Malwarebytes

Marcin Kleczynski from Malwarebytes has proved how to be a success story in developing your own company in this industry

Using Search Engines as Penetration Testing Tools

Using Search Engines as Penetration Testing Tools

Dwelling on the potential for Google, Shodan and Censys as penetration testing tools.

Learn from Hackathons and Participation

Learn from Hackathons and Participation

Cyber@UC is the official student led Information Security OWASP Organization for the University of Cincinnati.

The Role of Blockchain in Cybersecurity

The Role of Blockchain in Cybersecurity

Blockchain could potentially help enhance cyber-defense as the platform can prevent fraudulent activities via consensus mechanism.

Can New ARM Protocols Thwart IoT Security Breaches?

Can New ARM Protocols Thwart IoT Security Breaches?

Less attention has been paid to the risks that IoT has created, in particular the vulnerability to cybercrime.

Golden SANS Generation - Retaining Future Cyber Stars

Golden SANS Generation - Retaining Future Cyber Stars

Infosecurity talks to James Lyne and Conor Kelly from the SANS retraining academy on what the process involves and teaches

Using Machine Learning Concepts and Applying to Cryptography

Using Machine Learning Concepts and Applying to Cryptography

Description of a project implementing a cryptosystem that consisted to three artificial neural networks adversely interacting together to learn to protect their communication.

What’s Hot on Infosecurity Magazine?