Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

Securing Medical Technology in the Age of COVID-19

Securing Medical Technology in the Age of COVID-19

Technology experts are feeling the pressure to develop new strategies to tackle healthcare challenges

Interview: The Security Queens

Interview: The Security Queens

Talking to the Security Queens about their coming together, aims and intentions

Changing Cybersecurity Behaviors in the Workplace: A Critique of the Evidence

Changing Cybersecurity Behaviors in the Workplace: A Critique of the Evidence

It is crucial that information security leadership colleagues understand how secure employee behavior is shaped and promoted

Biases in Perceptions of Information Security Threats

Biases in Perceptions of Information Security Threats

In order to maintain both personal and organizational security, individuals must perceive information security risks realistically.

How Web Applications Can Support Overall Security

How Web Applications Can Support Overall Security

Strategies to help organizations decrease the opportunity of running into undesirable web security issues.

Optimizing IoT Security by Implementing Artificial Intelligence

Optimizing IoT Security by Implementing Artificial Intelligence

This is an opportunity for IoT developers, especially those who may have been working on software projects, to get involved in the evolution of AI.

Interview: David Shrier, Oxford Cyber Future

Interview: David Shrier, Oxford Cyber Future

The launch of an online program educating cybersecurity essentials for professionals

New Technology Helps to Keep Cars Secure - Continuously

New Technology Helps to Keep Cars Secure - Continuously

These new assets provide a basis for extensive risk analysis that once required an entire cybersecurity audit performed by a dedicated team.

Enabling DevSecOps on SDLC and Importance in the Cyber Age

Enabling DevSecOps on SDLC and Importance in the Cyber Age

The prime purpose of DevSecOps is to make everyone in the organization an ambassador for security.

Challenges and Obstacles to Application of GDPR to Big Data

Challenges and Obstacles to Application of GDPR to Big Data

Enforcing data minimizations will limit the success to Big Data

Moving Online: How the Shift to Virtual Webinars Can be a Tool for Cybersecurity Inclusivity

Moving Online: How the Shift to Virtual Webinars Can be a Tool for Cybersecurity Inclusivity

Virtual events may help drive accessibility to all those who do not have the privilege of non-essential travel.

Unpacking the Security Pillar of the AWS Well Architected Framework

Unpacking the Security Pillar of the AWS Well Architected Framework

The five focus areas that define what security in the cloud is composed of on AWS

What’s Hot on Infosecurity Magazine?