Infosecurity Next-Gen Infosec

Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry. 

#HowTo Do a Cybersecurity Interview

#HowTo Do a Cybersecurity Interview

How should you prepare as a recruiter in the cybersecurity space

Data Privacy and Security: Why Mobile Apps are the New Weak Link

Data Privacy and Security: Why Mobile Apps are the New Weak Link

Mobile apps are the new weak link when it comes to user data and privacy abuse

DDoS Botnets are Back and Poised to Do Damage

DDoS Botnets are Back and Poised to Do Damage

To lessen the threat of botnets, it's critical for users to be more conscious of their own security

Geopolitical Cyber Threats and Business Operations

Geopolitical Cyber Threats and Business Operations

Cyber-attacks can be easily cross-continentally conducted by a small number of personnel in contrast to conventional warfare

Interview: Kimberly Sharpe, SecOps Institute Student

Interview: Kimberly Sharpe, SecOps Institute Student

How SecOps Cyber Institute is aiming to train students in the human intelligence specialty

Interview: Ben Spring, University of Portsmouth Student & TryHackMe Founder

Interview: Ben Spring, University of Portsmouth Student & TryHackMe Founder

Ben Spring talks about his training concept TryHackMe after a successful initial roll out

Is Access Control Permission a Possible Gateway for Hackers?

Is Access Control Permission a Possible Gateway for Hackers?

If your devices and services have misconfigured settings, it could be a step up for an attacker

Source Code Discovery Sheds Light on the Business of Malware

Source Code Discovery Sheds Light on the Business of Malware

The uncovering of the Carbanak source code has been an eye-opener into the sophisticated factory-line product development techniques of malware

Become a Master Hacker Without Going Back to School

Become a Master Hacker Without Going Back to School

How can you embark on a career as a hacker? The best news is that you don’t need to go back to school

The Key Trust Service Principles of SOC2 and How it Protects Organizations

The Key Trust Service Principles of SOC2 and How it Protects Organizations

SOC2 is designed to ensure that service providers are not given free will to do whatever they please with company data

Cryptojacking: It's Jacked Up

Cryptojacking: It's Jacked Up

Cryptojacking has been around for close to four to five years now, but it is only being cited as a problem now

Fragile Cybersecurity Receiving Knocks from Unexpected Quarters

Fragile Cybersecurity Receiving Knocks from Unexpected Quarters

Are governments leading efficiently and effectively on cybersecurity matters?

What’s Hot on Infosecurity Magazine?