Infosecurity Next-Gen Infosec

  1. Moving Online: How the Shift to Virtual Webinars Can be a Tool for Cybersecurity Inclusivity

    Virtual events may help drive accessibility to all those who do not have the privilege of non-essential travel.

    1. Photo of Amy Ertan

      Amy Ertan

      PhD researcher at the Centre for Doctoral Training in Cyber Security at Royal Holloway

  2. Unpacking the Security Pillar of the AWS Well Architected Framework

    The five focus areas that define what security in the cloud is composed of on AWS

    1. Photo of AJ Yawn

      AJ Yawn

      Co-Founder and CEO at ByteChek

  3. Interview: Hela Lucas, Cybersecurity and Digital Forensics Student, Edinburgh Napier University

    Student Hela Lucas talks about her career aspirations and experiences so far

  4. Cyber Risks Impact on Mergers and Acquisitions

    In an acquisition, the purchasing organization also acquires the associated cybersecurity program and cyber risks.

    1. Photo of AJ Yawn

      AJ Yawn

      Co-Founder and CEO at ByteChek

  5. Privacy and Security at Stake with the Increased Use of Biometrics?

    How privacy laws and regulations can improve secure handing of biometric data.

    1. Photo of Chaminda Hewage

      Chaminda Hewage

      Associate Professor in Data Security at Cardiff Metropolitan University

  6. Finding and Fixing Blind Spots in Enterprise IoT Security

    IoT devices are created with the primary aim of efficiency, while security takes a back seat

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  7. Interview: Jung Lee, CyberVista

    How one company is revising the concept of assessment to better train and hire

  8. The Next Generation Should Complete an Apprenticeship, Not a Degree

    Opening cybersecurity up to more apprentices will not only create a larger and more diverse workforce; they will also better equip individuals

    1. Photo of Phil Chapman

      Phil Chapman

      Senior Instructor - Cybersecurity, Firebrand Training

  9. Enterprise Risk Management in Cybersecurity

    With each innovation, there are risks associated with it.

    1. Photo of Michael Effiong

      Michael Effiong

      Ph.D candidate at University of the Cumberlands

  10. Payroll: The Next Payment Security Battleground

    Payroll has served as a soft target for too long

    1. Photo of Ryan Kh

      Ryan Kh

      Founder/CEO of Catalyst For Business

  11. Interview: Haylin Abdulkadir, Purdue University Global

    Haylin Abdulkadir from Purdue University Global talks about trends in cybersecurity and how they affect her

  12. #NextGenResearch: Are Jobs Requiring Unachievable Levels of Experience and Qualifications?

    Are you seeing job ads for roles in cybersecurity requiring unachievable levels of experience and qualifications?

  13. #NextGenResearch: Would You Expect Company Training For Skills Required For Compliance and Cloud?

    Would you expect a company to train you on the job in those skills needed for compliance and cloud?

  14. Driving Tech Education in Foreign Lands

    For many, breaking into the cybersecurity industry can feel like a direct road without a starting point.

    1. Photo of James Mullen

      James Mullen

      Security Consultant, Edgescan

  15. #NextGenResearch: Is There Enough Training to Work With IaaS?

    Is there enough training and education on how to work with infrastructure as a service options?

  16. #NextGenResearch: How Familiar Are You With Compliance Frameworks?

    Are you aware of the demands of GDPR, PCI DSS, PSD2 and other compliance frameworks, what they mean, and how they're different?

  17. #NextGenResearch: Are GRC Skills Being Demanded in Job Adverts?

    Is there more demand for governance, risk and compliance skills in job ads?

  18. #NextGenResearch: Is the Next Generation Ready to Deal With Malware?

    Would they be ready to deal with malware threats from the work they have done

  19. Assessing the Cost Structure of GDPR Compliance Strategies

    What factors affect the costs of compliance?

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

What’s hot on Infosecurity Magazine?