Infosecurity Next-Gen Infosec

  1. Your Multi-Factor Authentication Technology is Already Compromised – Here's How

    How can organizations introduce truly passwordless authentication?

    1. Photo of Misan Etchie

      Misan Etchie

      Experienced blogger, tech enthusiast, technical writer and digital marketer

  2. The Need to Re-Invent Cybersecurity at the Enterprise Level

    There is a need to rethink enterprise cybersecurity architectures by adopting more holistic models of protection

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  3. Why Do Businesses Fail in Implementing DevOps?

    Prepare for your DevOps journey by avoiding the mistakes that organizations often make without realizing them

    1. Photo of Farwa Sajjad

      Farwa Sajjad

      Cybersecurity Blogger

  4. The Case for Fostering a Cybersecurity Work Culture

    Humans are the weakest link in the cybersecurity chain, but they are also the greatest agents of change when adopting a security-first mindset

    1. Photo of Lakeisha Henderson

      Lakeisha Henderson

      student, Cleveland State University and marketing intern, Julie Security

  5. Is Using a VPN Illegal?

    What are the issues around hiding your identity and gaining access to blocked content via VPN?

    1. Photo of Misan Etchie

      Misan Etchie

      Experienced blogger, tech enthusiast, technical writer and digital marketer

  6. Refreshing Cyber Awareness Training

    Cybersecurity awareness training needs a refresh to make it engaging, interesting and relatable

    1. Photo of Jackson Mills

      Jackson Mills

      founder, Generation Cyber

  7. Will 5G Technology Increase Mobile Security?

    What are the security benefits and shortcomings of 5G technology?

    1. Photo of Farwa Sajjad

      Farwa Sajjad

      Cybersecurity Blogger

  8. The Biggest Cyber-Threat Isn't Hackers, It's Insider Threats

    Insider threats are a bigger danger to enterprise security than external forces are, and organizations must act

    1. Photo of Misan Etchie

      Misan Etchie

      Experienced blogger, tech enthusiast, technical writer and digital marketer

  9. Vulnerability Management With Applied Context

    Context must be applied to the process of remediating vulnerabilities to protect your business effectively

    1. Photo of John  Meah

      John Meah

      Cybersecurity Specialist and Freelance Writer

  10. The Benefits and Challenges of Passwordless Authentication

    Moving from conventional passwords to a more secure authentication method will improve an organization’s overall security

    1. Photo of Farwa Sajjad

      Farwa Sajjad

      Cybersecurity Blogger

  11. Why Understanding Data Privacy is More Important Than Ever

    Improving knowledge on data privacy will help both individuals and businesses keep their critical data safe

    1. Photo of Zola Lamprecht

      Zola Lamprecht

      content marketing, NextLabs

  12. The Principles and Technologies Heralding the Next Cybersecurity Revolution

    Next gen cybersecurity technologies will need to authenticate everything that tries to access a network

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

What’s hot on Infosecurity Magazine?