Infosecurity Next-Gen Infosec

Interview: David Shrier, Oxford Cyber Future

Interview: David Shrier, Oxford Cyber Future

The launch of an online program educating cybersecurity essentials for professionals

New Technology Helps to Keep Cars Secure - Continuously

New Technology Helps to Keep Cars Secure - Continuously

These new assets provide a basis for extensive risk analysis that once required an entire cybersecurity audit performed by a dedicated team.

Enabling DevSecOps on SDLC and Importance in the Cyber Age

Enabling DevSecOps on SDLC and Importance in the Cyber Age

The prime purpose of DevSecOps is to make everyone in the organization an ambassador for security.

Challenges and Obstacles to Application of GDPR to Big Data

Challenges and Obstacles to Application of GDPR to Big Data

Enforcing data minimizations will limit the success to Big Data

Moving Online: How the Shift to Virtual Webinars Can be a Tool for Cybersecurity Inclusivity

Moving Online: How the Shift to Virtual Webinars Can be a Tool for Cybersecurity Inclusivity

Virtual events may help drive accessibility to all those who do not have the privilege of non-essential travel.

Unpacking the Security Pillar of the AWS Well Architected Framework

Unpacking the Security Pillar of the AWS Well Architected Framework

The five focus areas that define what security in the cloud is composed of on AWS

Interview: Hela Lucas, Cybersecurity and Digital Forensics Student, Edinburgh Napier University

Interview: Hela Lucas, Cybersecurity and Digital Forensics Student, Edinburgh Napier University

Student Hela Lucas talks about her career aspirations and experiences so far

Cyber Risks Impact on Mergers and Acquisitions

Cyber Risks Impact on Mergers and Acquisitions

In an acquisition, the purchasing organization also acquires the associated cybersecurity program and cyber risks.

Privacy and Security at Stake with the Increased Use of Biometrics?

Privacy and Security at Stake with the Increased Use of Biometrics?

How privacy laws and regulations can improve secure handing of biometric data.

Finding and Fixing Blind Spots in Enterprise IoT Security

Finding and Fixing Blind Spots in Enterprise IoT Security

IoT devices are created with the primary aim of efficiency, while security takes a back seat

Interview: Jung Lee, CyberVista

Interview: Jung Lee, CyberVista

How one company is revising the concept of assessment to better train and hire

The Next Generation Should Complete an Apprenticeship, Not a Degree

The Next Generation Should Complete an Apprenticeship, Not a Degree

Opening cybersecurity up to more apprentices will not only create a larger and more diverse workforce; they will also better equip individuals

What’s Hot on Infosecurity Magazine?