Infosecurity Next-Gen Infosec
Web Hosting Security Threats to Watch Out for During This Season
Threats to web hosting services are genuine and can cause widespread destruction if malicious attempts are successful
Why Companies Need to Understand and Create a Protocol for Insider Threats
Companies need to establish a clear protocol for combating insider threats
Insider Threat Mitigation: The Role of AI and ML
What roles does AI and Machine Learning play in addressing insider threats?
Interview: AJ Yawn, ByteChek
Talking to AJ Yawn about the concept behind the launch of his new company
When is a VPN Unsafe?
At some point, a VPN becomes a security liability.
Risk Management in the Pandemic
An adequate cyber risk management enables organizations to recognize and control a risky and an uncertain situation
Interview: Jenny Potts
How Jenny is aiming to make a difference in how we learn about coding in infosec
Counteracting File-Based Threats Using CDR Tech
CDR works by assuming that all files are potentially infected
How Do You Protect Your Data Against Personalization?
How to control the data social media companies hold about you
Interview: Damian Vavanos, Social Hackers Academy
How one academy is aiming to bring cybersecuirty skills to the less privileged in society
Technological Innovations Defining the Future of Cybersecurity and the New Normal for Businesses
What role new technologies could play in transforming traditional cybersecurity.
The Four Benefits of Data Mining: Google’s Side of the Data Story
How much money do you make for Google by using their services?
Self-Sovereign Identities to Protect Future Social Media Platforms from Hacking
The failure to do so will make the users become jittery about their privacy in the hands of the social media platforms and lose their confidence in them.
Interview: Taharka Beamon, SOC Manager, Reed Exhibitions
Infosecurity speaks to Taharka Beamon about the importance of keeping SOC staff happy and engaged in their jobs
Keeping Your Crypto Wallet Safe
A sure way to keep your crypto funds away from prying eyes and malevolent hands.
In the Wake of SIGRed, is Good-Enough DDI Still Good Enough?
The choice that large enterprises have make on whether to accept ‘good-enough’ DDI.
Ransomware Adopts a Game-Changing Blackmail Model for Information Theft
Looking at ransomware types, how they operate and utilize double blackmail schemes.
Data Protection in the Wake of Deepfakes
Should deepfakes be classified as personal data?
NCA and Immersive Labs Offer Summer Education Plan for Teens
Teens offered training at Cyber4Summer
Soft Skill Strategies for Handling Insider Threats Ethically
Soft skills allow us to build trust among staff, something a mature culture of security awareness cannot operate without.