Infosecurity Next-Gen Infosec
Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry.

#NextGenResearch: Is There Enough Training to Work With IaaS?
Is there enough training and education on how to work with infrastructure as a service options?

#NextGenResearch: How Familiar Are You With Compliance Frameworks?
Are you aware of the demands of GDPR, PCI DSS, PSD2 and other compliance frameworks, what they mean, and how they're different?

#NextGenResearch: Are GRC Skills Being Demanded in Job Adverts?
Is there more demand for governance, risk and compliance skills in job ads?

#NextGenResearch: Are Communication and Presentation Skills Taught or Encouraged to an Acceptable Level?
Will the next generation be ready to present to the board?

#NextGenResearch: Is the Next Generation Ready to Deal With Malware?
Would they be ready to deal with malware threats from the work they have done

Assessing the Cost Structure of GDPR Compliance Strategies
What factors affect the costs of compliance?

Security Operations - The Human Element
As a SOC becomes more complex, the workforce structure adapts from a hierarchical structure to a fluid and dynamic workforce

Registration for CyberCenturion VI Open For Another Week
Let the cyber games begin

The Rise of the Security Developer
With security developers on the team, businesses suddenly have the skills to tune integrations to their unique needs

Security Operations – Technology and Architecture
The reliance on a SOC as a means of defensive capability is paramount

Interview: Conor Cronin and James Mullen, Edgescan
Infosecurity talked with Edgescan's new recruits about internships, opportunities and getting a job in cybersecurity

Understanding and Managing Third Party Vendor Risk
Businesses now must also diligently evaluate the security policies and procedures of third party vendors