Infosecurity Next-Gen Infosec

Security Operations – Technology and Architecture

Security Operations – Technology and Architecture

The reliance on a SOC as a means of defensive capability is paramount

Interview: Conor Cronin and James Mullen, Edgescan

Interview: Conor Cronin and James Mullen, Edgescan

Infosecurity talked with Edgescan's new recruits about internships, opportunities and getting a job in cybersecurity

Understanding and Managing Third Party Vendor Risk

Understanding and Managing Third Party Vendor Risk

Businesses now must also diligently evaluate the security policies and procedures of third party vendors

Data Security Lessons from Recent Anti-Virus Companies’ Breaches

Data Security Lessons from Recent Anti-Virus Companies’ Breaches

Even the providers of endpoint security are vulnerable to attack

How Advancements in Technology Are Fraught With Privacy Policies

How Advancements in Technology Are Fraught With Privacy Policies

Technological advancements have produced enormous benefits for our society

#HowTo Do a Cybersecurity Interview

#HowTo Do a Cybersecurity Interview

How should you prepare as a recruiter in the cybersecurity space

Data Privacy and Security: Why Mobile Apps are the New Weak Link

Data Privacy and Security: Why Mobile Apps are the New Weak Link

Mobile apps are the new weak link when it comes to user data and privacy abuse

DDoS Botnets are Back and Poised to Do Damage

DDoS Botnets are Back and Poised to Do Damage

To lessen the threat of botnets, it's critical for users to be more conscious of their own security

Geopolitical Cyber Threats and Business Operations

Geopolitical Cyber Threats and Business Operations

Cyber-attacks can be easily cross-continentally conducted by a small number of personnel in contrast to conventional warfare

Interview: SecOps Institute

Interview: SecOps Institute

How SecOps Cyber Institute is aiming to train students in the human intelligence specialty

Interview: Ben Spring, University of Portsmouth Student & TryHackMe Founder

Interview: Ben Spring, University of Portsmouth Student & TryHackMe Founder

Ben Spring talks about his training concept TryHackMe after a successful initial roll out

Is Access Control Permission a Possible Gateway for Hackers?

Is Access Control Permission a Possible Gateway for Hackers?

If your devices and services have misconfigured settings, it could be a step up for an attacker

What’s Hot on Infosecurity Magazine?