Infosecurity Next-Gen Infosec

  1. Influence of Artificial Intelligence and Machine Learning in Cybersecurity

    Why AI and Machine Learning are reflective of the predicted advancements in IT.

    1. Aneetta Andrews

      Psychology Student and Technology Enthusiast

  2. Creating Your Perfect Big Data Engineer Resume

    How to craft the ultimate Big Data engineer resume, and get the job.

    1. Photo of Grace Carter

      Grace Carter

      Tech Writer

  3. What Separates the Good From the Bad: Mental Health and Cybersecurity

    Mental health can have critical implications on cybersecurity practices.

  4. Why We Cannot be Trusted to Make Our Own Passwords

    Does your password contain numbers 1, 2 or 3, or what about letters E or T?

    1. Photo of James Stevenson

      James Stevenson

      Software Engineer

  5. WhatsApp: Newest Attack Target for Mobile Phishing

    Attackers have embraced other ways of utilizing phishing attacks, namely through messaging services such as WhatsApp, Skype, and even plain old SMS.

    1. Photo of Uladzislau Murashka

      Uladzislau Murashka

      Ethical Hacker, ScienceSoft

  6. The Culture Shock of a Non-Profit Founder of a Women in Cybersecurity Group

    There has to be a deeper systemic connection between the perceptions of cybersecurity at the citizen level, in addition to its stead in our current school systems.

    1. Photo of MacKenzie Brown

      MacKenzie Brown

      Research Principal at Optiv

  7. Adaptive Commensurate Response to Protect Cyber-Physical Systems

    Current cyber-physical system protocols and applications allow significant changes to a system to take place within a short time or small network footprint, which can be exploited

    1. Photo of Zhiyuan  Zheng

      Zhiyuan Zheng

      Computer Engineering Graduate

  8. Shielding Your Network from Dynamic Content Attacks

    How to defend against a CDN attack, and how they are orchestrated.

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

  9. Penetration Testers in the Cloud

    Even in the cloud, penetration testers can be the right people to identify the enterprise’s surface, complexity, and cyber weaknesses.

  10. Hardware Security Revisited

    Hardware is no less vulnerable to attack than any other system because hardware is an often overlooked piece of the security puzzle.

  11. Interview: Aimee Laycock, COO, CLTRe

    Understanding that your company has a security culture is one thing, but what do you do with the data?

  12. Why e-PHI Lies at the Heart of Any Good HIPAA Strategy

    What do IT vendors need to do to safeguard electronic protected health information?

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

What’s hot on Infosecurity Magazine?