Infosecurity Next-Gen Infosec

  1. Brazilian General Data Protection Law – Overview and Implications

    Definitions, characteristics, and provisions of the Brazilian General Data Protection Law, and its implications for the privacy landscape in Brazil overall.

    1. Photo of Osama Tahir

      Osama Tahir

      Cybersecurity Analyst at VPNRanks

  2. The Rise of Cyber-Terrorism, and the Future of its Detection

    Could predictive and detection techniques be used for cyber-incidents?

    1. Photo of James Stevenson

      James Stevenson

      Software Engineer

  3. VPN Won’t Keep You Safe Without a Strong SIEM By Its Side

    Think VPN is keeping you safe while working from home? Think again

    1. Photo of Sivan Omer

      Sivan Omer

      Product Manager, empow

  4. Stop Criminalizing Research to Enable Development

    How focusing on how criminalization and lack of initiatives about risky/offending behavior impact cybersecurity negatively and limit the talent pool

    1. Yanna Papadodimitraki

      Researcher, University of Leeds

  5. Vietnam’s Rise in Cyberspace

    Vietnam has also slowly emerged as the newest Gladiator of cyberspace in the Asia-Pacific region.

    1. Photo of Abhilash Halappanavar

      Abhilash Halappanavar

      Electronics and communications engineer

  6. You’re Probably Missing These Pieces On Web Application Security

    We shouldn’t defocus on how to protect developed apps

    1. Photo of Rooney Reeves

      Rooney Reeves

      Business Development Executive at eTatvaSoft

  7. Learning Kali Linux in an Online Environment

    Offensive Security launches an online academy to learn Kali Linux

  8. Developing a Central Control Framework for Large Enterprises

    Implementing a central control framework is an effective way to reduce operational disruption

    1. Photo of AJ Yawn

      AJ Yawn

      Co-Founder and CEO at ByteChek

  9. When It Comes to Cybersecurity, the Small and Medium Business Community Needs to Do Better

    In the post-quarantine world, SMBs must embrace their importance and scale up their cybersecurity appropriately.

    1. Photo of Jennifer Keltz

      Jennifer Keltz

      Incoming Risk Analyst, Deloitte

  10. Do Privacy Rights Override #COVID19 Surveillance Measures?

    Concerns raised by the public in the use of technological solutions to combat COVID-19 demonstrates the extent of their awareness of the risk.

    1. Photo of Shinie Bentotahewa

      Shinie Bentotahewa

      Cyber Security Researcher, Cardiff Metropolitan University

    2. Photo of Chaminda Hewage

      Chaminda Hewage

      Associate Professor in Data Security at Cardiff Metropolitan University

    3. Photo of Dr Jason Williams

      Dr Jason Williams

      Dr Deputy Dean, Learning and Teaching School of Technologies, Cardiff Metropolitan University

  11. Securing Medical Technology in the Age of COVID-19

    Technology experts are feeling the pressure to develop new strategies to tackle healthcare challenges

    1. Photo of Sarah Katz

      Sarah Katz

      Senior Information Security Analyst at NASA Ames Research Center

  12. Interview: The Security Queens

    Talking to the Security Queens about their coming together, aims and intentions

  13. Changing Cybersecurity Behaviors in the Workplace: A Critique of the Evidence

    It is crucial that information security leadership colleagues understand how secure employee behavior is shaped and promoted

    1. Photo of Amy Ertan

      Amy Ertan

      PhD researcher at the Centre for Doctoral Training in Cyber Security at Royal Holloway

  14. Biases in Perceptions of Information Security Threats

    In order to maintain both personal and organizational security, individuals must perceive information security risks realistically.

    1. Photo of Georgia Crossland

      Georgia Crossland

      PhD researcher at the Centre for Doctoral Training in Cyber Security, Royal Holloway

  15. How Web Applications Can Support Overall Security

    Strategies to help organizations decrease the opportunity of running into undesirable web security issues.

    1. Photo of Rooney Reeves

      Rooney Reeves

      Business Development Executive at eTatvaSoft

  16. Optimizing IoT Security by Implementing Artificial Intelligence

    This is an opportunity for IoT developers, especially those who may have been working on software projects, to get involved in the evolution of AI.

    1. Photo of Liqaa Nawaf

      Liqaa Nawaf

      Senior Lecturer in Computing and Information Systems, Cardiff Metropolitan University

  17. Interview: David Shrier, Oxford Cyber Future

    The launch of an online program educating cybersecurity essentials for professionals

  18. New Technology Helps to Keep Cars Secure - Continuously

    These new assets provide a basis for extensive risk analysis that once required an entire cybersecurity audit performed by a dedicated team.

    1. Photo of Eyal Traitel

      Eyal Traitel

      Head of Customer Success, Cybellum

  19. Enabling DevSecOps on SDLC and Importance in the Cyber Age

    The prime purpose of DevSecOps is to make everyone in the organization an ambassador for security.

    1. Photo of Farwa Sajjad

      Farwa Sajjad

      Cybersecurity Blogger

  20. Challenges and Obstacles to Application of GDPR to Big Data

    Enforcing data minimizations will limit the success to Big Data

    1. Photo of Shinie Bentotahewa

      Shinie Bentotahewa

      Cyber Security Researcher, Cardiff Metropolitan University

    2. Photo of Chaminda Hewage

      Chaminda Hewage

      Associate Professor in Data Security at Cardiff Metropolitan University

What’s hot on Infosecurity Magazine?