Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

Why Data Breaches are all About Trust

Why Data Breaches are all About Trust

When it comes to computer security, we require trust more than most.

Ensuring the UK Cybersecurity Profession Retains a Hotbed of Talent

Ensuring the UK Cybersecurity Profession Retains a Hotbed of Talent

We need to hire efficiently, create champions in the workplace and look at how cybersecurity qualifications are designed

Influence of Artificial Intelligence and Machine Learning in Cybersecurity

Influence of Artificial Intelligence and Machine Learning in Cybersecurity

Why AI and Machine Learning are reflective of the predicted advancements in IT.

Creating Your Perfect Big Data Engineer Resume

Creating Your Perfect Big Data Engineer Resume

How to craft the ultimate Big Data engineer resume, and get the job.

What Separates the Good From the Bad: Mental Health and Cybersecurity

What Separates the Good From the Bad: Mental Health and Cybersecurity

Mental health can have critical implications on cybersecurity practices.

Why We Cannot be Trusted to Make Our Own Passwords

Why We Cannot be Trusted to Make Our Own Passwords

Does your password contain numbers 1, 2 or 3, or what about letters E or T?

WhatsApp: Newest Attack Target for Mobile Phishing

WhatsApp: Newest Attack Target for Mobile Phishing

Attackers have embraced other ways of utilizing phishing attacks, namely through messaging services such as WhatsApp, Skype, and even plain old SMS.

The Culture Shock of a Non-Profit Founder of a Women in Cybersecurity Group

The Culture Shock of a Non-Profit Founder of a Women in Cybersecurity Group

There has to be a deeper systemic connection between the perceptions of cybersecurity at the citizen level, in addition to its stead in our current school systems.

Adaptive Commensurate Response to Protect Cyber-Physical Systems

Adaptive Commensurate Response to Protect Cyber-Physical Systems

Current cyber-physical system protocols and applications allow significant changes to a system to take place within a short time or small network footprint, which can be exploited

Shielding Your Network from Dynamic Content Attacks

Shielding Your Network from Dynamic Content Attacks

How to defend against a CDN attack, and how they are orchestrated.

Penetration Testers in the Cloud

Penetration Testers in the Cloud

Even in the cloud, penetration testers can be the right people to identify the enterprise’s surface, complexity, and cyber weaknesses.

Hardware Security Revisited

Hardware Security Revisited

Hardware is no less vulnerable to attack than any other system because hardware is an often overlooked piece of the security puzzle.

What’s Hot on Infosecurity Magazine?