Infosecurity Next-Gen Infosec
Brazilian General Data Protection Law – Overview and Implications
Definitions, characteristics, and provisions of the Brazilian General Data Protection Law, and its implications for the privacy landscape in Brazil overall.
The Rise of Cyber-Terrorism, and the Future of its Detection
Could predictive and detection techniques be used for cyber-incidents?
VPN Won’t Keep You Safe Without a Strong SIEM By Its Side
Think VPN is keeping you safe while working from home? Think again
Stop Criminalizing Research to Enable Development
How focusing on how criminalization and lack of initiatives about risky/offending behavior impact cybersecurity negatively and limit the talent pool
Vietnam’s Rise in Cyberspace
Vietnam has also slowly emerged as the newest Gladiator of cyberspace in the Asia-Pacific region.
You’re Probably Missing These Pieces On Web Application Security
We shouldn’t defocus on how to protect developed apps
Learning Kali Linux in an Online Environment
Offensive Security launches an online academy to learn Kali Linux
Developing a Central Control Framework for Large Enterprises
Implementing a central control framework is an effective way to reduce operational disruption
When It Comes to Cybersecurity, the Small and Medium Business Community Needs to Do Better
In the post-quarantine world, SMBs must embrace their importance and scale up their cybersecurity appropriately.
Do Privacy Rights Override #COVID19 Surveillance Measures?
Concerns raised by the public in the use of technological solutions to combat COVID-19 demonstrates the extent of their awareness of the risk.
Securing Medical Technology in the Age of COVID-19
Technology experts are feeling the pressure to develop new strategies to tackle healthcare challenges
Interview: The Security Queens
Talking to the Security Queens about their coming together, aims and intentions
Changing Cybersecurity Behaviors in the Workplace: A Critique of the Evidence
It is crucial that information security leadership colleagues understand how secure employee behavior is shaped and promoted
Biases in Perceptions of Information Security Threats
In order to maintain both personal and organizational security, individuals must perceive information security risks realistically.
How Web Applications Can Support Overall Security
Strategies to help organizations decrease the opportunity of running into undesirable web security issues.
Optimizing IoT Security by Implementing Artificial Intelligence
This is an opportunity for IoT developers, especially those who may have been working on software projects, to get involved in the evolution of AI.
Interview: David Shrier, Oxford Cyber Future
The launch of an online program educating cybersecurity essentials for professionals
New Technology Helps to Keep Cars Secure - Continuously
These new assets provide a basis for extensive risk analysis that once required an entire cybersecurity audit performed by a dedicated team.
Enabling DevSecOps on SDLC and Importance in the Cyber Age
The prime purpose of DevSecOps is to make everyone in the organization an ambassador for security.
Challenges and Obstacles to Application of GDPR to Big Data
Enforcing data minimizations will limit the success to Big Data