Infosecurity Next-Gen Infosec

  1. Cyber-Physical Systems Are at Risk

    Recent research work has been focused to protect CPS and IoT devices from different perspectives.

    1. Photo of Sye Loong Keoh

      Sye Loong Keoh

      Associate Professor (Computing Science), University of Glasgow

  2. Train Your Employees to Think for Themselves in Data Security

    Since employees have access to company information, they are technically a bigger danger to data security than attackers.

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  3. Data Breach Laws are Increasingly Common, do they make a Sufficient Difference?

    The idea that data security laws lack punch isn't just idle speculation.

    1. Photo of Ryan Kh

      Ryan Kh

      Founder/CEO of Catalyst For Business

  4. Do You Have What It Takes To Be a Threat Hunter?

    Why cyber threat hunting can be an exciting and interesting career choice, but is it suitable for everyone?

    1. Photo of Tim Bandos

      Tim Bandos

      Director of Cybersecurity, Digital Guardian

  5. The Skills Employers Do Not Require, and Why

    Which skills are employers not looking for?

  6. How Can We Better Prepare Recent Graduates to Obtain a Job in the Cybersecurity Workforce?

    The only way to solve for the demand of suitable candidates is to modify current curriculum for current technology needs by helping students get more hands on experience.

    1. Photo of Jeff  Meacham

      Jeff Meacham

      Adjunct Professor, and Cybersecurity & Information Assurance Graduate

  7. Interview: Colin Gillingham, NCC Group

    Colin Gillingham from NCC Group talks about the need for more hands-on interviewing, and why actual experience is the best training.

  8. GDPR and Data Privacy - Now a PhD Subject

    Infosecurity met with some PhD Students, for whom data protection and the GDPR has become a major part of their research.

  9. Unleashing Your Catalysts to Maximize Cybersecurity Gains

    As a cyber-leader, embrace the value of empowering catalysts and ensure you’re positioning them to create maximum value.

    1. Photo of Matthew  Doan

      Matthew Doan

      Principal, Commercial Solutions, Booz Allen Hamilton

  10. Cybersecurity Skills Shortage: Where Are All the Penetration Testers?

    Why you are not finding penetration testers, and what you can do about it.

    1. Photo of Chris Sullivan

      Chris Sullivan

      Chief Information Security Officer, SecureAuth

  11. R Vs Python: Battle in the field of Data Science

    In data science, both R and Python have their own sets of pros and cons.

    1. Aneetta Andrews

      Psychology Student and Technology Enthusiast

  12. We Need to Define Career Pathways and How to Step Up Your Career

    We all need to think about cybersecurity no longer being a niche, but a sector that grows every day.

  13. Interview: Cath Goulding, Nominet

    Interview with Cath Goulding on her path to becoming head of cybersecurity at Nominet.

    1. Photo of Cath Goulding

      Cath Goulding

      Head of Cyber Security, Nominet

  14. Driverless Cars - Have we Learned Lessons From the Past?

    Are driverless cars showing the same mistakes in information security that were made in the past?

    1. Photo of Simon Butler

      Simon Butler

      Cyber Security researcher, Centre for Doctoral Training, Royal Holloway, University of London

  15. Which Capabilities and Skills Do Hiring Companies Actually Want?

    Which capabilities and skills do hiring companies actually want? A survey made the effort to find the answers

  16. Interview: Laurie Mercer, HackerOne

    Would you hire those people who are actively and ethically seeking vulnerabilities in your company?

  17. Where Should Pen Testing and Source Code Review Fit into your Dev Lifecycle?

    Source code review and penetration testing involve different techniques but they accomplish similar ends.

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

  18. Securing Your Web App with HTTP Headers

    A vulnerable area for web app security is the HTTP headers, so how do you fix them?

    1. Photo of Keval Padia

      Keval Padia

      Co-founder of Nimblechapps

  19. Skinner's Students Engage with Cyber Discovery

    School students tackle live cybersecurity scenario

  20. How AI Can Stop Ransomware, Detect Malware and Reduce Risk

    Cybersecurity is just one area where AI and ML are solving many challenges, including worker shortages, increased attacks, and more malware detection.

    1. Photo of Josh Fu

      Josh Fu

      Technical Account Manager

What’s hot on Infosecurity Magazine?