Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

Social Media Phishing – The 2023 Cybersecurity Threat

Social Media Phishing – The 2023 Cybersecurity Threat

Zehra Ali discusses the different forms of social media phishing and tips on how to stay safe from this threat

How SMEs Can Secure the Remote Workforce

How SMEs Can Secure the Remote Workforce

SMEs face a growing challenge to secure their remote workforce against cyber threats

How to Protect Your Intellectual Property and Trade Secrets from Cyber Theft

How to Protect Your Intellectual Property and Trade Secrets from Cyber Theft

With the stakes getting higher, organizations must treat IP protection more seriously

5 Challenges CISOs Are Facing in 2023

5 Challenges CISOs Are Facing in 2023

Ali Cameron highlights the five biggest challenges for CISOs in 2023

A 2023 Guide to Secure Cloud Deployment for Improved Application Security

A 2023 Guide to Secure Cloud Deployment for Improved Application Security

Secure cloud deployment is critical to protect applications and data stored in the cloud

The Future of VPNs: What to Expect in the Next Decade

The Future of VPNs: What to Expect in the Next Decade

With the use of VPNs on the rise to help address privacy and security concerns, Michael Chukwube explores the future of this technology

Reducing the Risk of Severe Data Breaches

Reducing the Risk of Severe Data Breaches

Data breaches often result in severe financial and reputational losses for victims

Essential Practices for Defense Against Social Engineering Attacks

Essential Practices for Defense Against Social Engineering Attacks

Organizations must have a multi-faceted approach to tackling the scourge of social engineering attacks

The Growing Threat of Broken Authentication Attacks on APIs

The Growing Threat of Broken Authentication Attacks on APIs

Broken authentication is one of the most common methods of attack for criminals looking to breach APIs

How to Implement a Foolproof IoT Cybersecurity Strategy

How to Implement a Foolproof IoT Cybersecurity Strategy

IoT devices are improving our lives but face significant cyber-threats

Email Security: Protecting Your Organization from Within

Email Security: Protecting Your Organization from Within

Email security is crucial for modern organizations, and a robust security plan requires proactive measures

How Can SMEs Improve Their Cybersecurity Resilience?

How Can SMEs Improve Their Cybersecurity Resilience?

Cybersecurity breaches affecting SMEs at scale can have catastrophic costs for society

What’s Hot on Infosecurity Magazine?