Infosecurity Next-Gen Infosec
Cyber-Physical Systems Are at Risk
Recent research work has been focused to protect CPS and IoT devices from different perspectives.
Train Your Employees to Think for Themselves in Data Security
Since employees have access to company information, they are technically a bigger danger to data security than attackers.
Data Breach Laws are Increasingly Common, do they make a Sufficient Difference?
The idea that data security laws lack punch isn't just idle speculation.
Do You Have What It Takes To Be a Threat Hunter?
Why cyber threat hunting can be an exciting and interesting career choice, but is it suitable for everyone?
The Skills Employers Do Not Require, and Why
Which skills are employers not looking for?
How Can We Better Prepare Recent Graduates to Obtain a Job in the Cybersecurity Workforce?
The only way to solve for the demand of suitable candidates is to modify current curriculum for current technology needs by helping students get more hands on experience.
Interview: Colin Gillingham, NCC Group
Colin Gillingham from NCC Group talks about the need for more hands-on interviewing, and why actual experience is the best training.
GDPR and Data Privacy - Now a PhD Subject
Infosecurity met with some PhD Students, for whom data protection and the GDPR has become a major part of their research.
Unleashing Your Catalysts to Maximize Cybersecurity Gains
As a cyber-leader, embrace the value of empowering catalysts and ensure you’re positioning them to create maximum value.
Cybersecurity Skills Shortage: Where Are All the Penetration Testers?
Why you are not finding penetration testers, and what you can do about it.
R Vs Python: Battle in the field of Data Science
In data science, both R and Python have their own sets of pros and cons.
We Need to Define Career Pathways and How to Step Up Your Career
We all need to think about cybersecurity no longer being a niche, but a sector that grows every day.
Interview: Cath Goulding, Nominet
Interview with Cath Goulding on her path to becoming head of cybersecurity at Nominet.
Driverless Cars - Have we Learned Lessons From the Past?
Are driverless cars showing the same mistakes in information security that were made in the past?
Which Capabilities and Skills Do Hiring Companies Actually Want?
Which capabilities and skills do hiring companies actually want? A survey made the effort to find the answers
Interview: Laurie Mercer, HackerOne
Would you hire those people who are actively and ethically seeking vulnerabilities in your company?
Where Should Pen Testing and Source Code Review Fit into your Dev Lifecycle?
Source code review and penetration testing involve different techniques but they accomplish similar ends.
Securing Your Web App with HTTP Headers
A vulnerable area for web app security is the HTTP headers, so how do you fix them?
Skinner's Students Engage with Cyber Discovery
School students tackle live cybersecurity scenario
How AI Can Stop Ransomware, Detect Malware and Reduce Risk
Cybersecurity is just one area where AI and ML are solving many challenges, including worker shortages, increased attacks, and more malware detection.