Infosecurity Next-Gen Infosec

Vietnam’s Rise in Cyberspace

Vietnam’s Rise in Cyberspace

Vietnam has also slowly emerged as the newest Gladiator of cyberspace in the Asia-Pacific region.

You’re Probably Missing These Pieces On Web Application Security

You’re Probably Missing These Pieces On Web Application Security

We shouldn’t defocus on how to protect developed apps

Learning Kali Linux in an Online Environment

Learning Kali Linux in an Online Environment

Offensive Security launches an online academy to learn Kali Linux

Developing a Central Control Framework for Large Enterprises

Developing a Central Control Framework for Large Enterprises

Implementing a central control framework is an effective way to reduce operational disruption

When It Comes to Cybersecurity, the Small and Medium Business Community Needs to Do Better

When It Comes to Cybersecurity, the Small and Medium Business Community Needs to Do Better

In the post-quarantine world, SMBs must embrace their importance and scale up their cybersecurity appropriately.

Do Privacy Rights Override #COVID19 Surveillance Measures?

Do Privacy Rights Override #COVID19 Surveillance Measures?

Concerns raised by the public in the use of technological solutions to combat COVID-19 demonstrates the extent of their awareness of the risk.

Securing Medical Technology in the Age of COVID-19

Securing Medical Technology in the Age of COVID-19

Technology experts are feeling the pressure to develop new strategies to tackle healthcare challenges

Interview: The Security Queens

Interview: The Security Queens

Talking to the Security Queens about their coming together, aims and intentions

Changing Cybersecurity Behaviors in the Workplace: A Critique of the Evidence

Changing Cybersecurity Behaviors in the Workplace: A Critique of the Evidence

It is crucial that information security leadership colleagues understand how secure employee behavior is shaped and promoted

Biases in Perceptions of Information Security Threats

Biases in Perceptions of Information Security Threats

In order to maintain both personal and organizational security, individuals must perceive information security risks realistically.

How Web Applications Can Support Overall Security

How Web Applications Can Support Overall Security

Strategies to help organizations decrease the opportunity of running into undesirable web security issues.

Optimizing IoT Security by Implementing Artificial Intelligence

Optimizing IoT Security by Implementing Artificial Intelligence

This is an opportunity for IoT developers, especially those who may have been working on software projects, to get involved in the evolution of AI.

What’s Hot on Infosecurity Magazine?