Infosecurity Next-Gen Infosec

  1. Security Operations - The Human Element

    As a SOC becomes more complex, the workforce structure adapts from a hierarchical structure to a fluid and dynamic workforce

    1. Jack Whitter-Jones

      Security Enthusiast

  2. The Rise of the Security Developer

    With security developers on the team, businesses suddenly have the skills to tune integrations to their unique needs

    1. Photo of Richard Cody

      Richard Cody

      Integrations Product Manager, ThreatConnect

  3. Security Operations – Technology and Architecture

    The reliance on a SOC as a means of defensive capability is paramount

    1. Jack Whitter-Jones

      Security Enthusiast

  4. Interview: Conor Cronin and James Mullen, Edgescan

    Infosecurity talked with Edgescan's new recruits about internships, opportunities and getting a job in cybersecurity

  5. Understanding and Managing Third Party Vendor Risk

    Businesses now must also diligently evaluate the security policies and procedures of third party vendors

    1. Photo of Taharka Beamon

      Taharka Beamon

      Security Analyst, Reed Exhibitions USA

  6. Data Security Lessons from Recent Anti-Virus Companies’ Breaches

    Even the providers of endpoint security are vulnerable to attack

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  7. How Advancements in Technology Are Fraught With Privacy Policies

    Technological advancements have produced enormous benefits for our society

    1. Photo of John Ejiofor

      John Ejiofor

      Founder and editor of Nature Torch

  8. #HowTo Do a Cybersecurity Interview

    How should you prepare as a recruiter in the cybersecurity space

    1. Photo of Simon Wright

      Simon Wright

      Sales & Marketing Director at CareersinAudit.com

  9. Data Privacy and Security: Why Mobile Apps are the New Weak Link

    Mobile apps are the new weak link when it comes to user data and privacy abuse

    1. Photo of Thomas Michael

      Thomas Michael

      Cybersecurity Expert

  10. DDoS Botnets are Back and Poised to Do Damage

    To lessen the threat of botnets, it's critical for users to be more conscious of their own security

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

  11. Geopolitical Cyber Threats and Business Operations

    Cyber-attacks can be easily cross-continentally conducted by a small number of personnel in contrast to conventional warfare

What’s hot on Infosecurity Magazine?