Infosecurity Next-Gen Infosec

  1. Web Hosting Security Threats to Watch Out for During This Season

    Threats to web hosting services are genuine and can cause widespread destruction if malicious attempts are successful

    1. Photo of Gert Svaiko

      Gert Svaiko

      Freelance Writer

  2. Why Companies Need to Understand and Create a Protocol for Insider Threats

    Companies need to establish a clear protocol for combating insider threats

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  3. Insider Threat Mitigation: The Role of AI and ML

    What roles does AI and Machine Learning play in addressing insider threats?

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  4. Interview: AJ Yawn, ByteChek

    Talking to AJ Yawn about the concept behind the launch of his new company

  5. When is a VPN Unsafe?

    At some point, a VPN becomes a security liability.

    1. Photo of Daniel Moyanda

      Daniel Moyanda

      Entrepreneur, Digital Marketer, and Thought Leader

  6. Risk Management in the Pandemic

    An adequate cyber risk management enables organizations to recognize and control a risky and an uncertain situation

  7. Interview: Jenny Potts

    How Jenny is aiming to make a difference in how we learn about coding in infosec

  8. Counteracting File-Based Threats Using CDR Tech

    CDR works by assuming that all files are potentially infected

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  9. How Do You Protect Your Data Against Personalization?

    How to control the data social media companies hold about you

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  10. Interview: Damian Vavanos, Social Hackers Academy

    How one academy is aiming to bring cybersecuirty skills to the less privileged in society

  11. Technological Innovations Defining the Future of Cybersecurity and the New Normal for Businesses

    What role new technologies could play in transforming traditional cybersecurity.

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  12. The Four Benefits of Data Mining: Google’s Side of the Data Story

    How much money do you make for Google by using their services?

    1. Photo of Misan Etchie

      Misan Etchie

      Experienced blogger, tech enthusiast, technical writer and digital marketer

  13. Self-Sovereign Identities to Protect Future Social Media Platforms from Hacking

    The failure to do so will make the users become jittery about their privacy in the hands of the social media platforms and lose their confidence in them.

    1. Photo of Shinie Bentotahewa

      Shinie Bentotahewa

      Cyber Security Researcher, Cardiff Metropolitan University

    2. Photo of Chaminda Hewage

      Chaminda Hewage

      Associate Professor in Data Security at Cardiff Metropolitan University

    3. Photo of Imtiaz Khan

      Imtiaz Khan

      Associate Professor in Data Science at Cardiff Metropolitan University

    4. Photo of Ali Shahaab

      Ali Shahaab

      Blockchain Researcher at Cardiff Metropolitan University

  14. Interview: Taharka Beamon, SOC Manager, Reed Exhibitions

    Infosecurity speaks to Taharka Beamon about the importance of keeping SOC staff happy and engaged in their jobs

  15. Keeping Your Crypto Wallet Safe

    A sure way to keep your crypto funds away from prying eyes and malevolent hands.

    1. Photo of Daniel Moyanda

      Daniel Moyanda

      Entrepreneur, Digital Marketer, and Thought Leader

  16. In the Wake of SIGRed, is Good-Enough DDI Still Good Enough?

    The choice that large enterprises have make on whether to accept ‘good-enough’ DDI.

    1. Photo of Dana Iskoldski

      Dana Iskoldski

      Corporate Communications Manager for BlueCat

  17. Ransomware Adopts a Game-Changing Blackmail Model for Information Theft

    Looking at ransomware types, how they operate and utilize double blackmail schemes.

    1. Photo of Muhammad  Hamza Shahid

      Muhammad Hamza Shahid

      Security Advocate

  18. Data Protection in the Wake of Deepfakes

    Should deepfakes be classified as personal data?

    1. Photo of Chaminda Hewage

      Chaminda Hewage

      Associate Professor in Data Security at Cardiff Metropolitan University

  19. NCA and Immersive Labs Offer Summer Education Plan for Teens

    Teens offered training at Cyber4Summer

  20. Soft Skill Strategies for Handling Insider Threats Ethically

    Soft skills allow us to build trust among staff, something a mature culture of security awareness cannot operate without.

    1. Photo of Keavy Murphy

      Keavy Murphy

      Senior Director of Security, Starburst Data

What’s hot on Infosecurity Magazine?