Infosecurity Next-Gen Infosec

  1. Interview: SecOps Institute

    How SecOps Cyber Institute is aiming to train students in the human intelligence specialty

  2. Interview: Ben Spring, University of Portsmouth Student & TryHackMe Founder

    Ben Spring talks about his training concept TryHackMe after a successful initial roll out

  3. Is Access Control Permission a Possible Gateway for Hackers?

    If your devices and services have misconfigured settings, it could be a step up for an attacker

    1. Photo of Devin Smith

      Devin Smith

      Technology Writer

  4. Source Code Discovery Sheds Light on the Business of Malware

    The uncovering of the Carbanak source code has been an eye-opener into the sophisticated factory-line product development techniques of malware

    1. Photo of Ben McCarthy

      Ben McCarthy

      Senior Content Developer, Immersive Labs

  5. Become a Master Hacker Without Going Back to School

    How can you embark on a career as a hacker? The best news is that you don’t need to go back to school

    1. Photo of Ben Sadeghipour

      Ben Sadeghipour

      Head of Hacker Education, HackerOne

  6. The Key Trust Service Principles of SOC2 and How it Protects Organizations

    SOC2 is designed to ensure that service providers are not given free will to do whatever they please with company data

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  7. Cryptojacking: It's Jacked Up

    Cryptojacking has been around for close to four to five years now, but it is only being cited as a problem now

    1. Photo of Christian Eaddy

      Christian Eaddy

      Information and Computer Technology Student

  8. Fragile Cybersecurity Receiving Knocks from Unexpected Quarters

    Are governments leading efficiently and effectively on cybersecurity matters?

    1. Photo of John Ejiofor

      John Ejiofor

      Founder and editor of Nature Torch

  9. The Fileless Shall Have Power

    Common tactics for a LotL attack, and defending against them

  10. Cybersecurity Implementation Versus Organizational Layers of Leadership

    How can a CEO ensure the successful implementation and buy-in to digital transformation adoption

  11. Why Cybersecurity Planning Should be an Integral part of the Marketing Function

    In the case of a breach, why marketing needs to be part of incident response.

  12. Organizational Leadership and Cybersecurity Success

    Increasing digital interconnectivity brings cyber threats and risks for organizations

What’s hot on Infosecurity Magazine?