Infosecurity Next-Gen Infosec

  1. Interview: David Shrier, Oxford Cyber Future

    The launch of an online program educating cybersecurity essentials for professionals

  2. New Technology Helps to Keep Cars Secure - Continuously

    These new assets provide a basis for extensive risk analysis that once required an entire cybersecurity audit performed by a dedicated team.

    1. Photo of Eyal Traitel

      Eyal Traitel

      Head of Customer Success, Cybellum

  3. Enabling DevSecOps on SDLC and Importance in the Cyber Age

    The prime purpose of DevSecOps is to make everyone in the organization an ambassador for security.

    1. Photo of Farwa Sajjad

      Farwa Sajjad

      Cybersecurity Blogger

  4. Challenges and Obstacles to Application of GDPR to Big Data

    Enforcing data minimizations will limit the success to Big Data

    1. Photo of Shinie Bentotahewa

      Shinie Bentotahewa

      Cyber Security Researcher, Cardiff Metropolitan University

    2. Photo of Chaminda Hewage

      Chaminda Hewage

      Associate Professor in Data Security at Cardiff Metropolitan University

  5. Moving Online: How the Shift to Virtual Webinars Can be a Tool for Cybersecurity Inclusivity

    Virtual events may help drive accessibility to all those who do not have the privilege of non-essential travel.

    1. Photo of Amy Ertan

      Amy Ertan

      PhD researcher at the Centre for Doctoral Training in Cyber Security at Royal Holloway

  6. Unpacking the Security Pillar of the AWS Well Architected Framework

    The five focus areas that define what security in the cloud is composed of on AWS

    1. Photo of AJ Yawn

      AJ Yawn

      Co-Founder and CEO at ByteChek

  7. Interview: Hela Lucas, Cybersecurity and Digital Forensics Student, Edinburgh Napier University

    Student Hela Lucas talks about her career aspirations and experiences so far

  8. Cyber Risks Impact on Mergers and Acquisitions

    In an acquisition, the purchasing organization also acquires the associated cybersecurity program and cyber risks.

    1. Photo of AJ Yawn

      AJ Yawn

      Co-Founder and CEO at ByteChek

  9. Privacy and Security at Stake with the Increased Use of Biometrics?

    How privacy laws and regulations can improve secure handing of biometric data.

    1. Photo of Chaminda Hewage

      Chaminda Hewage

      Associate Professor in Data Security at Cardiff Metropolitan University

  10. Finding and Fixing Blind Spots in Enterprise IoT Security

    IoT devices are created with the primary aim of efficiency, while security takes a back seat

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  11. Interview: Jung Lee, CyberVista

    How one company is revising the concept of assessment to better train and hire

  12. The Next Generation Should Complete an Apprenticeship, Not a Degree

    Opening cybersecurity up to more apprentices will not only create a larger and more diverse workforce; they will also better equip individuals

    1. Photo of Phil Chapman

      Phil Chapman

      Senior Instructor - Cybersecurity, Firebrand Training

What’s hot on Infosecurity Magazine?