Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

Your Multi-Factor Authentication Technology is Already Compromised – Here's How

Your Multi-Factor Authentication Technology is Already Compromised – Here's How

How can organizations introduce truly passwordless authentication?

The Need to Re-Invent Cybersecurity at the Enterprise Level

The Need to Re-Invent Cybersecurity at the Enterprise Level

There is a need to rethink enterprise cybersecurity architectures by adopting more holistic models of protection

Why Do Businesses Fail in Implementing DevOps?

Why Do Businesses Fail in Implementing DevOps?

Prepare for your DevOps journey by avoiding the mistakes that organizations often make without realizing them

The Case for Fostering a Cybersecurity Work Culture

The Case for Fostering a Cybersecurity Work Culture

Humans are the weakest link in the cybersecurity chain, but they are also the greatest agents of change when adopting a security-first mindset

Is Using a VPN Illegal?

Is Using a VPN Illegal?

What are the issues around hiding your identity and gaining access to blocked content via VPN?

Refreshing Cyber Awareness Training

Refreshing Cyber Awareness Training

Cybersecurity awareness training needs a refresh to make it engaging, interesting and relatable

Will 5G Technology Increase Mobile Security?

Will 5G Technology Increase Mobile Security?

What are the security benefits and shortcomings of 5G technology?

The Biggest Cyber-Threat Isn't Hackers, It's Insider Threats

The Biggest Cyber-Threat Isn't Hackers, It's Insider Threats

Insider threats are a bigger danger to enterprise security than external forces are, and organizations must act

Vulnerability Management With Applied Context

Vulnerability Management With Applied Context

Context must be applied to the process of remediating vulnerabilities to protect your business effectively

The Benefits and Challenges of Passwordless Authentication

The Benefits and Challenges of Passwordless Authentication

Moving from conventional passwords to a more secure authentication method will improve an organization’s overall security

Why Understanding Data Privacy is More Important Than Ever

Why Understanding Data Privacy is More Important Than Ever

Improving knowledge on data privacy will help both individuals and businesses keep their critical data safe

The Principles and Technologies Heralding the Next Cybersecurity Revolution

The Principles and Technologies Heralding the Next Cybersecurity Revolution

Next gen cybersecurity technologies will need to authenticate everything that tries to access a network

What’s Hot on Infosecurity Magazine?