Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

The Growing Threat of Broken Authentication Attacks on APIs

The Growing Threat of Broken Authentication Attacks on APIs

Broken authentication is one of the most common methods of attack for criminals looking to breach APIs

How to Implement a Foolproof IoT Cybersecurity Strategy

How to Implement a Foolproof IoT Cybersecurity Strategy

IoT devices are improving our lives but face significant cyber-threats

Email Security: Protecting Your Organization from Within

Email Security: Protecting Your Organization from Within

Email security is crucial for modern organizations, and a robust security plan requires proactive measures

How Can SMEs Improve Their Cybersecurity Resilience?

How Can SMEs Improve Their Cybersecurity Resilience?

Cybersecurity breaches affecting SMEs at scale can have catastrophic costs for society

How to Overcome Challenges to Zero Trust Adoption

How to Overcome Challenges to Zero Trust Adoption

Organizations must conduct a zero trust assessment of their environment and existing capabilities and create a roadmap to achieve it

API Attacks Have Emerged as the #1 Threat Vector in 2022

API Attacks Have Emerged as the #1 Threat Vector in 2022

Today’s businesses must harden APIs against threats at every level of their organization

What Proof of Stake Means for the Future of Blockchain Security

What Proof of Stake Means for the Future of Blockchain Security

Proof of stake is emerging as a new way to secure the blockchain

Are Phishing Scams Likely to Go Away Anytime Soon?

Are Phishing Scams Likely to Go Away Anytime Soon?

There are numerous measures organizations can take to reduce their chances of becoming a victim of phishing attacks

Is Passwordless Authentication Safe to Use?

Is Passwordless Authentication Safe to Use?

It is important to deploy passwordless authentication carefully

Eight Benefits of Securing Data Using a VPN

Eight Benefits of Securing Data Using a VPN

Organizations interested in keeping their data safe and secure for efficient growth and server functionality should acquire a VPN

What’s Top of Mind for CISOs in 2022?

What’s Top of Mind for CISOs in 2022?

As employees settle into more flexible work arrangements, security professionals are tasked with finding new and reliable ways to approach safety

Proactive Problem-Solving Tips in DevOps: Guide for 2022

Proactive Problem-Solving Tips in DevOps: Guide for 2022

During a DevOps transformation cycle, the culture and environment must adapt to a new paradigm of collaboration, scalability and automation

What’s Hot on Infosecurity Magazine?