Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

#NextGenResearch: Is There Enough Training to Work With IaaS?

#NextGenResearch: Is There Enough Training to Work With IaaS?

Is there enough training and education on how to work with infrastructure as a service options?

#NextGenResearch: How Familiar Are You With Compliance Frameworks?

#NextGenResearch: How Familiar Are You With Compliance Frameworks?

Are you aware of the demands of GDPR, PCI DSS, PSD2 and other compliance frameworks, what they mean, and how they're different?

#NextGenResearch: Are GRC Skills Being Demanded in Job Adverts?

#NextGenResearch: Are GRC Skills Being Demanded in Job Adverts?

Is there more demand for governance, risk and compliance skills in job ads?

#NextGenResearch: Is the Next Generation Ready to Deal With Malware?

#NextGenResearch: Is the Next Generation Ready to Deal With Malware?

Would they be ready to deal with malware threats from the work they have done

Security Operations - The Human Element

Security Operations - The Human Element

As a SOC becomes more complex, the workforce structure adapts from a hierarchical structure to a fluid and dynamic workforce

The Rise of the Security Developer

The Rise of the Security Developer

With security developers on the team, businesses suddenly have the skills to tune integrations to their unique needs

Security Operations – Technology and Architecture

Security Operations – Technology and Architecture

The reliance on a SOC as a means of defensive capability is paramount

Interview: Conor Cronin and James Mullen, Edgescan

Interview: Conor Cronin and James Mullen, Edgescan

Infosecurity talked with Edgescan's new recruits about internships, opportunities and getting a job in cybersecurity

Understanding and Managing Third Party Vendor Risk

Understanding and Managing Third Party Vendor Risk

Businesses now must also diligently evaluate the security policies and procedures of third party vendors

What’s Hot on Infosecurity Magazine?