Infosecurity Next-Gen Infosec

Web Hosting Security Threats to Watch Out for During This Season

Web Hosting Security Threats to Watch Out for During This Season

Threats to web hosting services are genuine and can cause widespread destruction if malicious attempts are successful

Why Companies Need to Understand and Create a Protocol for Insider Threats

Why Companies Need to Understand and Create a Protocol for Insider Threats

Companies need to establish a clear protocol for combating insider threats

Insider Threat Mitigation: The Role of AI and ML

Insider Threat Mitigation: The Role of AI and ML

What roles does AI and Machine Learning play in addressing insider threats?

Interview: AJ Yawn, ByteChek

Interview: AJ Yawn, ByteChek

Talking to AJ Yawn about the concept behind the launch of his new company

When is a VPN Unsafe?

When is a VPN Unsafe?

At some point, a VPN becomes a security liability.

Risk Management in the Pandemic

Risk Management in the Pandemic

An adequate cyber risk management enables organizations to recognize and control a risky and an uncertain situation

Interview: Jenny Potts

Interview: Jenny Potts

How Jenny is aiming to make a difference in how we learn about coding in infosec

Counteracting File-Based Threats Using CDR Tech

Counteracting File-Based Threats Using CDR Tech

CDR works by assuming that all files are potentially infected

How Do You Protect Your Data Against Personalization?

How Do You Protect Your Data Against Personalization?

How to control the data social media companies hold about you

Interview: Damian Vavanos, Social Hackers Academy

Interview: Damian Vavanos, Social Hackers Academy

How one academy is aiming to bring cybersecuirty skills to the less privileged in society

Technological Innovations Defining the Future of Cybersecurity and the New Normal for Businesses

Technological Innovations Defining the Future of Cybersecurity and the New Normal for Businesses

What role new technologies could play in transforming traditional cybersecurity.

The Four Benefits of Data Mining: Google’s Side of the Data Story

The Four Benefits of Data Mining: Google’s Side of the Data Story

How much money do you make for Google by using their services?

What’s Hot on Infosecurity Magazine?