Infosecurity Next-Gen Infosec

  1. Is Using a VPN Illegal?

    What are the issues around hiding your identity and gaining access to blocked content via VPN?

    1. Photo of Misan Etchie

      Misan Etchie

      Experienced blogger, tech enthusiast, technical writer and digital marketer

  2. Refreshing Cyber Awareness Training

    Cybersecurity awareness training needs a refresh to make it engaging, interesting and relatable

    1. Photo of Jackson Mills

      Jackson Mills

      founder, Generation Cyber

  3. Will 5G Technology Increase Mobile Security?

    What are the security benefits and shortcomings of 5G technology?

    1. Photo of Farwa Sajjad

      Farwa Sajjad

      Cybersecurity Blogger

  4. The Biggest Cyber-Threat Isn't Hackers, It's Insider Threats

    Insider threats are a bigger danger to enterprise security than external forces are, and organizations must act

    1. Photo of Misan Etchie

      Misan Etchie

      Experienced blogger, tech enthusiast, technical writer and digital marketer

  5. Vulnerability Management With Applied Context

    Context must be applied to the process of remediating vulnerabilities to protect your business effectively

    1. Photo of John  Meah

      John Meah

      Cybersecurity Specialist and Freelance Writer

  6. The Benefits and Challenges of Passwordless Authentication

    Moving from conventional passwords to a more secure authentication method will improve an organization’s overall security

    1. Photo of Farwa Sajjad

      Farwa Sajjad

      Cybersecurity Blogger

  7. Why Understanding Data Privacy is More Important Than Ever

    Improving knowledge on data privacy will help both individuals and businesses keep their critical data safe

    1. Photo of Zola Lamprecht

      Zola Lamprecht

      content marketing, NextLabs

  8. The Principles and Technologies Heralding the Next Cybersecurity Revolution

    Next gen cybersecurity technologies will need to authenticate everything that tries to access a network

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  9. The Top Five Ecommerce Security Threats to Watch Out for in 2021

    In 2021, ecommerce will continue growing rapidly, and so will related cybersecurity threats

    1. Photo of Kristina Tuvikene

      Kristina Tuvikene

      Freelance Writer

  10. Risk Evaluation and Management in the Age of the Connected Supply Chain

    Many orgs require a change of mindset in their approach towards cybersecurity

    1. Photo of John Ejiofor

      John Ejiofor

      Founder and editor of Nature Torch

  11. A Guide to Choosing a Hosting Platform for Your Business

    The pros and cons of hosting options

    1. Photo of Daniel Moyanda

      Daniel Moyanda

      Entrepreneur, Digital Marketer, and Thought Leader

  12. WhatsApp Chaos: Time for a Comprehensive Data Security and Privacy Law?

    WhatsApp hit the headlines with the launch of its new terms and conditions

    1. Photo of Shinie Bentotahewa

      Shinie Bentotahewa

      Cyber Security Researcher, Cardiff Metropolitan University

    2. Photo of Chaminda Hewage

      Chaminda Hewage

      Associate Professor in Data Security at Cardiff Metropolitan University

    3. Photo of Dr Jason Williams

      Dr Jason Williams

      Dr Deputy Dean, Learning and Teaching School of Technologies, Cardiff Metropolitan University

  13. New Ethical Concerns in Online Privacy and Data Security

    Companies should be more responsible in how they handle customer data, and customers should be more careful about the info they share with brands

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  14. The Future of Govt Engagement in Open Source Technology and Crowdsourcing

    Knowledge must be shared for it to expand with the help of a community, and this is exactly what open source does

    1. Photo of Suryansh Mansharamani

      Suryansh Mansharamani

      Student, Developer, Bug Bounty Hunter, CTFer & Freelance Writer

  15. A Case Against CVSS

    The CVSS standard has become a blight upon enterprise security

    1. Photo of Henry Howland

      Henry Howland

      Security Analyst & Tech Enthusiast

  16. The Great Authentication Gap: How Password Habits Differ Across Generations

    We all, to some extent, assume older people are less knowledgeable about technology

    1. Photo of Misan Etchie

      Misan Etchie

      Experienced blogger, tech enthusiast, technical writer and digital marketer

  17. Becoming the Enemy: How Ethical Hacking Changes Your Outlook on Security

    How does understanding the offensive side of the cyber playing field change how you perceive security?

    1. Photo of Jason  Johnson

      Jason Johnson

      Co-Founder and Penetration Tester

  18. How COVID-19 Tilted the Scale in Favor of VPNs

    VPNs have become a must-have for remote workers to do their jobs during the pandemic

    1. Photo of John Ejiofor

      John Ejiofor

      Founder and editor of Nature Torch

  19. Principles of Effective Cybersecurity Wargames

    Why use wargames (or ‘serious games’) as an educational mechanism?

    1. Photo of Peadar Callaghan

      Peadar Callaghan

      Serious Game Designer

    2. Photo of Amy Ertan

      Amy Ertan

      PhD researcher at the Centre for Doctoral Training in Cyber Security at Royal Holloway

  20. Two Cybersecurity Threats Retailers Should Watch Out for During the 2020 Holiday Season

    Unless a retailer understands how these attacks work and how to preve them, it will affect sales.

What’s hot on Infosecurity Magazine?