Infosecurity Next-Gen Infosec

In the Wake of SIGRed, is Good-Enough DDI Still Good Enough?

In the Wake of SIGRed, is Good-Enough DDI Still Good Enough?

The choice that large enterprises have make on whether to accept ‘good-enough’ DDI.

Ransomware Adopts a Game-Changing Blackmail Model for Information Theft

Ransomware Adopts a Game-Changing Blackmail Model for Information Theft

Looking at ransomware types, how they operate and utilize double blackmail schemes.

Data Protection in the Wake of Deepfakes

Data Protection in the Wake of Deepfakes

Should deepfakes be classified as personal data?

Soft Skill Strategies for Handling Insider Threats Ethically

Soft Skill Strategies for Handling Insider Threats Ethically

Soft skills allow us to build trust among staff, something a mature culture of security awareness cannot operate without.

Brazilian General Data Protection Law – Overview and Implications

Brazilian General Data Protection Law – Overview and Implications

Definitions, characteristics, and provisions of the Brazilian General Data Protection Law, and its implications for the privacy landscape in Brazil overall.

The Rise of Cyber-Terrorism, and the Future of its Detection

The Rise of Cyber-Terrorism, and the Future of its Detection

Could predictive and detection techniques be used for cyber-incidents?

VPN Won’t Keep You Safe Without a Strong SIEM By Its Side

VPN Won’t Keep You Safe Without a Strong SIEM By Its Side

Think VPN is keeping you safe while working from home? Think again

Stop Criminalizing Research to Enable Development

Stop Criminalizing Research to Enable Development

How focusing on how criminalization and lack of initiatives about risky/offending behavior impact cybersecurity negatively and limit the talent pool

Vietnam’s Rise in Cyberspace

Vietnam’s Rise in Cyberspace

Vietnam has also slowly emerged as the newest Gladiator of cyberspace in the Asia-Pacific region.

You’re Probably Missing These Pieces On Web Application Security

You’re Probably Missing These Pieces On Web Application Security

We shouldn’t defocus on how to protect developed apps

Learning Kali Linux in an Online Environment

Learning Kali Linux in an Online Environment

Offensive Security launches an online academy to learn Kali Linux

What’s Hot on Infosecurity Magazine?