Infosecurity Next-Gen Infosec
Is Cybersecurity Burnout Weakening Your Stance?
Career burnout is a real phenomenon that hampers your efforts to stay up-to-date about relevant vulnerabilities and respond in kind.
Cybersecurity, Where Art Thou?
Looking at the existential crisis of when, where, and how much to invest in cybersecurity.
Train and Pass the CISSP Exam
How to get the best education for a CISSP exam, and get the result you want.
Interview: Professor Steven Furnell, University of Plymouth
How some Plymouth University students are getting work experience and a qualification, with an IISP membership waiting at the end
Are Companies Ready to Implement GDPR-compliant Data Protection?
If you're like most businesses, then your GDPR experience will come down to whether you can anticipate the subtle nuances of regulatory adoption.
Should We Fear North Korea's Cyber Army?
The North Korean regime is suspected to be exploiting its cyber weapons for political purposes to intimidate its opponents as well as to steal crypto-currency.
The Cybersecurity Skills Shortage: What can Organizations Do to Tackle it?
What is the cybersecurity skills gap, and what is needed to resolve it?
Building a Cybersecurity Profession
Why education is at the heart of solving the cybersecurity skills gap.
Interview: Marcin Kleczynski, Malwarebytes
Marcin Kleczynski from Malwarebytes has proved how to be a success story in developing your own company in this industry
Using Search Engines as Penetration Testing Tools
Dwelling on the potential for Google, Shodan and Censys as penetration testing tools.
Learn from Hackathons and Participation
Cyber@UC is the official student led Information Security OWASP Organization for the University of Cincinnati.
The Role of Blockchain in Cybersecurity
Blockchain could potentially help enhance cyber-defense as the platform can prevent fraudulent activities via consensus mechanism.
Can New ARM Protocols Thwart IoT Security Breaches?
Less attention has been paid to the risks that IoT has created, in particular the vulnerability to cybercrime.
Golden SANS Generation - Retaining Future Cyber Stars
Infosecurity talks to James Lyne and Conor Kelly from the SANS retraining academy on what the process involves and teaches
Using Machine Learning Concepts and Applying to Cryptography
Description of a project implementing a cryptosystem that consisted to three artificial neural networks adversely interacting together to learn to protect their communication.
Easy Use Network Monitoring Software
How network monitoring software saved my computer, and a lot of time.
Cybersecurity is a Mess; Can Blockchains Fix It?
Blockchains are redefining industries as we know it.
How AI is the Future of Cybersecurity
Given the state of cybersecurity today, the implementation of AI systems into the mix can serve as a real turning point.
With Anti-Privacy Law, What Options Are There to Retain Cyber Anonymity?
With the Investigatory Powers Bill and Anti-Privacy Law being passed by governments, what options are there to hide your activity online?