Infosecurity Next-Gen Infosec

  1. Contingency Planning for the Red Team

    How to be efficient in preventing, responding and post-red team activity actions

    1. Photo of Jordyn Short

      Jordyn Short

      Cyber Security Analyst

  2. What Yahoo's Failed Data Breach Settlement Means for Cybersecurity

    What does the legal state of Yahoo's breach settlement mean for the future of cybersecurity

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

  3. Sensible Ways to Use Cyber Risk Ratings, Despite Methodological Shortcomings

    Cyber risk ratings, though attractive as a concept, are constrained by methodological shortcomings. Despite this, they can be a useful instrument helping to generate valuable insights for decision-making.

    1. Photo of Adam Klus

      Adam Klus

      PhD student at the University of Eastern Finland

  4. Interview: Charlie Hosier, 2018 Cyber Security Challenge Winner

    Charlie Hosier, winner of the 2018 Cyber Security Challenge, talks to Infosecurity about his career aspirations and experience so far

  5. Business Continuity/Disaster Recovery - Hoping for the Best, Prepared for the Worst, and Unsurprised by Anything in Between

    What a member of the IT team learned from participating in business continuity/disaster recovery drills.

    1. Photo of Taharka Beamon

      Taharka Beamon

      Security Analyst, Reed Exhibitions USA

  6. Using Natural Language Processing to Derive Motive From Text

    How predictive analytics can work.

    1. Photo of James Stevenson

      James Stevenson

      Software Engineer

  7. Using Offender Profiling Techniques in Security Operations

    How offender profiling techniques can help you be more preemptive in detection and prevention.

    1. Photo of James Stevenson

      James Stevenson

      Software Engineer

  8. Lessons from League of Legends Part 2: Focusing on the Goal

    How playing League of Legends taught a valuable lesson on rookie mistakes.

    1. Photo of Fareedah  Shaheed

      Fareedah Shaheed

      CEO and Founder of Sekuva

  9. What is the Evolving Role of Ethical Hackers in the New Age of Cybersecurity?

    There are still challenges that ethical hackers face, including certifications and legal problems.

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

  10. It’s Time for your First Security Conference

    Are you ready to get in the social mood, or do some learning at your first conference?

    1. Photo of James Stevenson

      James Stevenson

      Software Engineer

  11. Why Data Breaches are all About Trust

    When it comes to computer security, we require trust more than most.

    1. Photo of James Stevenson

      James Stevenson

      Software Engineer

  12. Ensuring the UK Cybersecurity Profession Retains a Hotbed of Talent

    We need to hire efficiently, create champions in the workplace and look at how cybersecurity qualifications are designed

    1. Photo of Rebecca Mameli

      Rebecca Mameli

      Head of Higher Education Research and Qualifications at Pearson UK

What’s hot on Infosecurity Magazine?