Infosecurity Next-Gen Infosec

  1. Why the Cyber-Criminals are Winning the Fight of Good vs. Evil

    Executives don’t realize that cybersecurity is one of those departments that if they’re doing their job right, you’ll never have much interaction with them.

    1. Photo of Ryan Hausknecht

      Ryan Hausknecht

      Security Consultant and Analyst

  2. A Guide to Delivering the Most Engaging Presentation

    Be it speaking to an audience at an industry conference, online or in front of your own management, it’s good to know a winning strategy

  3. Risk Assessment in Information Security - An Alternative Approach

    An alternative approach to information security risk assessment is to use a Value-at-risk analysis.

    1. Photo of Liuxuan Pan

      Liuxuan Pan

      PhD student in information security

    2. Photo of Dr Allan Tomlinson

      Dr Allan Tomlinson

      Senior Lecturer, Information Security Group

  4. Interview: Paul Dorey, Royal Holloway University

    Paul Dorey talks about student ambitions and education in cybersecurity at Royal Holloway University

  5. Interview: Simon Wright, CareersinCyberSecurity

    Simon Wright from CareersinCyberSecurity talks about career opportunities, and what the recruiters are really looking for.

    1. Photo of Simon Wright

      Simon Wright

      Sales & Marketing Director at CareersinAudit.com

  6. Why Cybersecurity Needs Skynet...or Something Similar!

    You could have a virtual environment of your IT infrastructure, have some scripts running to generate data and simulate the environment and the AI can try and find vulnerabilities that may exist in your system.

    1. Photo of Chris Brake

      Chris Brake

      Computer & Information Security Graduate

  7. The Need for Diversity and Career Opportunities

    What can be done to add diversity and create opportunities in cybersecurity? Deidre Diamond from CyberSN and #Brainbabe has some answers

  8. Facts Vs Feelings

    The ability to stay-connected to the world outside the confines of work is important to employees.

    1. Photo of Alexander Hawke

      Alexander Hawke

      Technical Lead - Incident Response, US Bank

  9. AI Development in Dire Need of Cybersecurity Regulations

    As the AI development industry rapidly expands, hopefully regulations will emerge soon.

    1. Photo of Martin Beltov

      Martin Beltov

      AI and Security Analyst and Researcher

  10. 7 Strategies to Switch from General IT to Cybersecurity

    what you need to do order to become an IT security expert if you are passionate about cybersecurity and pursuing a career in it.

    1. Photo of Stephanie Proper

      Stephanie Proper

      Professional career advisor

  11. Cybersecurity Made Easy

    The 21st century has given us some amazing marketplaces to connect customers to the exact vendors they are looking for, and there is a need for a cybersecurity marketplace too

    1. Photo of Josh Fu

      Josh Fu

      Technical Account Manager

  12. Akamai CSO Andy Ellis on His Cyber Career

    Akamai CSO Andy Ellis talks about his cybersecurity career path, and how to get to the position you want

  13. Cyber Sharing is Caring

    It's simpler to get people to share internally, where customers and partners cannot hold them accountable for their work.

    1. Photo of Carlota Sage

      Carlota Sage

      Collaboration & Communication Strategist

  14. Machine Learning Aided Ransomware Detection Using Process Power Consumption Patterns

    If ransomware has been successfully launched on a system, can we detect that this has happened while it is still happening?

    1. Ali Dehghantanha

      Department of Computer Science, School of Computing, Science and Engineering, University of Salford

    2. Kim-Kwang Raymond Choo

      Department of Information Systems and Cyber Security, University of Texas at San Antonio

    3. Andrew Young

      Department of Computer Science, School of Computing, Science and Engineering, University of Salford

  15. How Much Should You Trust Free VPNs With Your Online Security?

    VPNs have become useful tools that provide a handful of features to increase internet privacy and anonymity in business transactions.

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  16. How the US Senate Could Save (or Ruin) the IoT

    In the coming months, the US Senate is scheduled to discuss and vote on a new bill that concerns IoT security.

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

  17. DevOps + Security = ?

    DevSecOps is all about continuous delivery when it comes to DevOps so automation is key.

    1. Photo of Audrey Budryte

      Audrey Budryte

      Student at Queen Mary University of London

  18. Learnings from the CAT

    The Center of Applied Technology South (CAT South) is a trade school located in Maryland, and it is home to a number of courses.

    1. Photo of Jude Poole Jr

      Jude Poole Jr

      CAT South Member

  19. Breaking into Infosec

    By hard work you will break into the IT field and build up your experience and resume, through determination will eventually land you a job in the information security field

    1. Photo of Ryan Hausknecht

      Ryan Hausknecht

      Security Consultant and Analyst

  20. Tips for the Safe Implementation of Electronic Bill Pay

    Electronic bill presentiment and payment is only a few years old, and data theft is becoming a serious issue.

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

What’s hot on Infosecurity Magazine?