Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

  1. How to Prevent Data Leakages

    Joseph Chukwube discusses how businesses can detect and respond to data leaks and safeguard valuable data assets

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  2. Top Cloud Misconceptions that Could Damage Your Organization

    Shigraf Aijaz highlights common cloud computing misconceptions that can prevent organizations boosting their cybersecurity

    1. Photo of Shigraf Aijaz

      Shigraf Aijaz

      Contributing Writer

  3. Improve Asset Visibility in OT Security With Hybrid AI-Cloud Approaches

    Joseph Chukwube says that the complexity of OT security has hindered organizations’ abilities to mitigate threats effectively

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  4. How to Build a Positive Security Culture Without Becoming Big Brother

    Business leaders must learn how to walk the line between implementing security measures on employees without being overbearing

    1. Photo of Josh Breaker-Rolfe

      Josh Breaker-Rolfe

      Content Writer, Bora Design

  5. The Urgent Need to Enhance Cloud Data Security In 2023

    Farwa Sajjad says organizations must implement a range of measures to secure their cloud environments amid growing threats

    1. Photo of Farwa Sajjad

      Farwa Sajjad

      Cybersecurity Blogger

  6. How to Defend Against Modern Ransomware Attacks

    Shigraf Aijaz sets out the best approaches to defend against modern ransomware attacks

    1. Photo of Shigraf Aijaz

      Shigraf Aijaz

      Contributing Writer

  7. Social Media Phishing – The 2023 Cybersecurity Threat

    Zehra Ali discusses the different forms of social media phishing and tips on how to stay safe from this threat

    1. Photo of Zehra Ali

      Zehra Ali

      Cybersecurity Writer

  8. How SMEs Can Secure the Remote Workforce

    SMEs face a growing challenge to secure their remote workforce against cyber threats

    1. Photo of Michael Chukwube

      Michael Chukwube

      Digital Marketer, Content Writer and Tech Enthusiast

  9. How to Protect Your Intellectual Property and Trade Secrets from Cyber Theft

    With the stakes getting higher, organizations must treat IP protection more seriously

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  10. 5 Challenges CISOs Are Facing in 2023

    Ali Cameron highlights the five biggest challenges for CISOs in 2023

    1. Photo of Ali Cameron

      Ali Cameron

      content marketer

  11. A 2023 Guide to Secure Cloud Deployment for Improved Application Security

    Secure cloud deployment is critical to protect applications and data stored in the cloud

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  12. The Future of VPNs: What to Expect in the Next Decade

    With the use of VPNs on the rise to help address privacy and security concerns, Michael Chukwube explores the future of this technology

    1. Photo of Michael Chukwube

      Michael Chukwube

      Digital Marketer, Content Writer and Tech Enthusiast

What’s hot on Infosecurity Magazine?