Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

Fragile Cybersecurity Receiving Knocks from Unexpected Quarters

Fragile Cybersecurity Receiving Knocks from Unexpected Quarters

Are governments leading efficiently and effectively on cybersecurity matters?

The Fileless Shall Have Power

The Fileless Shall Have Power

Common tactics for a LotL attack, and defending against them

Cybersecurity Implementation Versus Organizational Layers of Leadership

Cybersecurity Implementation Versus Organizational Layers of Leadership

How can a CEO ensure the successful implementation and buy-in to digital transformation adoption

Why Cybersecurity Planning Should be an Integral part of the Marketing Function

Why Cybersecurity Planning Should be an Integral part of the Marketing Function

In the case of a breach, why marketing needs to be part of incident response.

Organizational Leadership and Cybersecurity Success

Organizational Leadership and Cybersecurity Success

Increasing digital interconnectivity brings cyber threats and risks for organizations

Contingency Planning for the Red Team

Contingency Planning for the Red Team

How to be efficient in preventing, responding and post-red team activity actions

What Yahoo's Failed Data Breach Settlement Means for Cybersecurity

What Yahoo's Failed Data Breach Settlement Means for Cybersecurity

What does the legal state of Yahoo's breach settlement mean for the future of cybersecurity

Sensible Ways to Use Cyber Risk Ratings, Despite Methodological Shortcomings

Sensible Ways to Use Cyber Risk Ratings, Despite Methodological Shortcomings

Cyber risk ratings, though attractive as a concept, are constrained by methodological shortcomings. Despite this, they can be a useful instrument helping to generate valuable insights for decision-making.

Interview: Charlie Hosier, 2018 Cyber Security Challenge Winner

Interview: Charlie Hosier, 2018 Cyber Security Challenge Winner

Charlie Hosier, winner of the 2018 Cyber Security Challenge, talks to Infosecurity about his career aspirations and experience so far

Business Continuity/Disaster Recovery - Hoping for the Best, Prepared for the Worst, and Unsurprised by Anything in Between

Business Continuity/Disaster Recovery - Hoping for the Best, Prepared for the Worst, and Unsurprised by Anything in Between

What a member of the IT team learned from participating in business continuity/disaster recovery drills.

Using Offender Profiling Techniques in Security Operations

Using Offender Profiling Techniques in Security Operations

How offender profiling techniques can help you be more preemptive in detection and prevention.

What’s Hot on Infosecurity Magazine?