Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

Interview: Conor Cronin and James Mullen, Edgescan

Interview: Conor Cronin and James Mullen, Edgescan

Infosecurity talked with Edgescan's new recruits about internships, opportunities and getting a job in cybersecurity

Understanding and Managing Third Party Vendor Risk

Understanding and Managing Third Party Vendor Risk

Businesses now must also diligently evaluate the security policies and procedures of third party vendors

Data Security Lessons from Recent Anti-Virus Companies’ Breaches

Data Security Lessons from Recent Anti-Virus Companies’ Breaches

Even the providers of endpoint security are vulnerable to attack

How Advancements in Technology Are Fraught With Privacy Policies

How Advancements in Technology Are Fraught With Privacy Policies

Technological advancements have produced enormous benefits for our society

#HowTo Do a Cybersecurity Interview

#HowTo Do a Cybersecurity Interview

How should you prepare as a recruiter in the cybersecurity space

Data Privacy and Security: Why Mobile Apps are the New Weak Link

Data Privacy and Security: Why Mobile Apps are the New Weak Link

Mobile apps are the new weak link when it comes to user data and privacy abuse

DDoS Botnets are Back and Poised to Do Damage

DDoS Botnets are Back and Poised to Do Damage

To lessen the threat of botnets, it's critical for users to be more conscious of their own security

Geopolitical Cyber Threats and Business Operations

Geopolitical Cyber Threats and Business Operations

Cyber-attacks can be easily cross-continentally conducted by a small number of personnel in contrast to conventional warfare

Interview: Kimberly Sharpe, SecOps Institute Student

Interview: Kimberly Sharpe, SecOps Institute Student

How SecOps Cyber Institute is aiming to train students in the human intelligence specialty

Interview: Ben Spring, University of Portsmouth Student & TryHackMe Founder

Interview: Ben Spring, University of Portsmouth Student & TryHackMe Founder

Ben Spring talks about his training concept TryHackMe after a successful initial roll out

Is Access Control Permission a Possible Gateway for Hackers?

Is Access Control Permission a Possible Gateway for Hackers?

If your devices and services have misconfigured settings, it could be a step up for an attacker

Source Code Discovery Sheds Light on the Business of Malware

Source Code Discovery Sheds Light on the Business of Malware

The uncovering of the Carbanak source code has been an eye-opener into the sophisticated factory-line product development techniques of malware

What’s Hot on Infosecurity Magazine?