Infosecurity Next-Gen Infosec

  1. Security Operations - The Human Element

    As a SOC becomes more complex, the workforce structure adapts from a hierarchical structure to a fluid and dynamic workforce

    1. Jack Whitter-Jones

      Security Enthusiast

  2. The Rise of the Security Developer

    With security developers on the team, businesses suddenly have the skills to tune integrations to their unique needs

    1. Photo of Richard Cody

      Richard Cody

      Integrations Product Manager, ThreatConnect

  3. Security Operations – Technology and Architecture

    The reliance on a SOC as a means of defensive capability is paramount

    1. Jack Whitter-Jones

      Security Enthusiast

  4. Interview: Conor Cronin and James Mullen, Edgescan

    Infosecurity talked with Edgescan's new recruits about internships, opportunities and getting a job in cybersecurity

  5. Understanding and Managing Third Party Vendor Risk

    Businesses now must also diligently evaluate the security policies and procedures of third party vendors

    1. Photo of Taharka Beamon

      Taharka Beamon

      Security Analyst, Reed Exhibitions USA

  6. Data Security Lessons from Recent Anti-Virus Companies’ Breaches

    Even the providers of endpoint security are vulnerable to attack

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  7. How Advancements in Technology Are Fraught With Privacy Policies

    Technological advancements have produced enormous benefits for our society

    1. Photo of John Ejiofor

      John Ejiofor

      Founder and editor of Nature Torch

  8. #HowTo Do a Cybersecurity Interview

    How should you prepare as a recruiter in the cybersecurity space

    1. Photo of Simon Wright

      Simon Wright

      Sales & Marketing Director at CareersinAudit.com

  9. Data Privacy and Security: Why Mobile Apps are the New Weak Link

    Mobile apps are the new weak link when it comes to user data and privacy abuse

    1. Photo of Thomas Michael

      Thomas Michael

      Cybersecurity Expert

  10. DDoS Botnets are Back and Poised to Do Damage

    To lessen the threat of botnets, it's critical for users to be more conscious of their own security

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

  11. Geopolitical Cyber Threats and Business Operations

    Cyber-attacks can be easily cross-continentally conducted by a small number of personnel in contrast to conventional warfare

  12. Interview: SecOps Institute

    How SecOps Cyber Institute is aiming to train students in the human intelligence specialty

  13. Interview: Ben Spring, University of Portsmouth Student & TryHackMe Founder

    Ben Spring talks about his training concept TryHackMe after a successful initial roll out

  14. Is Access Control Permission a Possible Gateway for Hackers?

    If your devices and services have misconfigured settings, it could be a step up for an attacker

    1. Photo of Devin Smith

      Devin Smith

      Technology Writer

  15. Source Code Discovery Sheds Light on the Business of Malware

    The uncovering of the Carbanak source code has been an eye-opener into the sophisticated factory-line product development techniques of malware

    1. Photo of Ben McCarthy

      Ben McCarthy

      Senior Content Developer, Immersive Labs

  16. Become a Master Hacker Without Going Back to School

    How can you embark on a career as a hacker? The best news is that you don’t need to go back to school

    1. Photo of Ben Sadeghipour

      Ben Sadeghipour

      Head of Hacker Education, HackerOne

  17. The Key Trust Service Principles of SOC2 and How it Protects Organizations

    SOC2 is designed to ensure that service providers are not given free will to do whatever they please with company data

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  18. Cryptojacking: It's Jacked Up

    Cryptojacking has been around for close to four to five years now, but it is only being cited as a problem now

    1. Photo of Christian Eaddy

      Christian Eaddy

      Information and Computer Technology Student

  19. Fragile Cybersecurity Receiving Knocks from Unexpected Quarters

    Are governments leading efficiently and effectively on cybersecurity matters?

    1. Photo of John Ejiofor

      John Ejiofor

      Founder and editor of Nature Torch

What’s hot on Infosecurity Magazine?