Infosecurity Next-Gen Infosec

The Great Authentication Gap: How Password Habits Differ Across Generations

The Great Authentication Gap: How Password Habits Differ Across Generations

We all, to some extent, assume older people are less knowledgeable about technology

Becoming the Enemy: How Ethical Hacking Changes Your Outlook on Security

Becoming the Enemy: How Ethical Hacking Changes Your Outlook on Security

How does understanding the offensive side of the cyber playing field change how you perceive security?

How COVID-19 Tilted the Scale in Favor of VPNs

How COVID-19 Tilted the Scale in Favor of VPNs

VPNs have become a must-have for remote workers to do their jobs during the pandemic

Principles of Effective Cybersecurity Wargames

Principles of Effective Cybersecurity Wargames

Why use wargames (or ‘serious games’) as an educational mechanism?

Two Cybersecurity Threats Retailers Should Watch Out for During the 2020 Holiday Season

Two Cybersecurity Threats Retailers Should Watch Out for During the 2020 Holiday Season

Unless a retailer understands how these attacks work and how to preve them, it will affect sales.

Web Hosting Security Threats to Watch Out for During This Season

Web Hosting Security Threats to Watch Out for During This Season

Threats to web hosting services are genuine and can cause widespread destruction if malicious attempts are successful

Why Companies Need to Understand and Create a Protocol for Insider Threats

Why Companies Need to Understand and Create a Protocol for Insider Threats

Companies need to establish a clear protocol for combating insider threats

Insider Threat Mitigation: The Role of AI and ML

Insider Threat Mitigation: The Role of AI and ML

What roles does AI and Machine Learning play in addressing insider threats?

Interview: AJ Yawn, ByteChek

Interview: AJ Yawn, ByteChek

Talking to AJ Yawn about the concept behind the launch of his new company

When is a VPN Unsafe?

When is a VPN Unsafe?

At some point, a VPN becomes a security liability.

Risk Management in the Pandemic

Risk Management in the Pandemic

An adequate cyber risk management enables organizations to recognize and control a risky and an uncertain situation

Interview: Jenny Potts

Interview: Jenny Potts

How Jenny is aiming to make a difference in how we learn about coding in infosec

What’s Hot on Infosecurity Magazine?