Infosecurity Next-Gen Infosec
The Fileless Shall Have Power
Common tactics for a LotL attack, and defending against them
Cybersecurity Implementation Versus Organizational Layers of Leadership
How can a CEO ensure the successful implementation and buy-in to digital transformation adoption
Why Cybersecurity Planning Should be an Integral part of the Marketing Function
In the case of a breach, why marketing needs to be part of incident response.
Organizational Leadership and Cybersecurity Success
Increasing digital interconnectivity brings cyber threats and risks for organizations
Contingency Planning for the Red Team
How to be efficient in preventing, responding and post-red team activity actions
What Yahoo's Failed Data Breach Settlement Means for Cybersecurity
What does the legal state of Yahoo's breach settlement mean for the future of cybersecurity
Sensible Ways to Use Cyber Risk Ratings, Despite Methodological Shortcomings
Cyber risk ratings, though attractive as a concept, are constrained by methodological shortcomings. Despite this, they can be a useful instrument helping to generate valuable insights for decision-making.
Interview: Charlie Hosier, 2018 Cyber Security Challenge Winner
Charlie Hosier, winner of the 2018 Cyber Security Challenge, talks to Infosecurity about his career aspirations and experience so far
Business Continuity/Disaster Recovery - Hoping for the Best, Prepared for the Worst, and Unsurprised by Anything in Between
What a member of the IT team learned from participating in business continuity/disaster recovery drills.
Using Natural Language Processing to Derive Motive From Text
How predictive analytics can work.
Using Offender Profiling Techniques in Security Operations
How offender profiling techniques can help you be more preemptive in detection and prevention.
Lessons from League of Legends Part 2: Focusing on the Goal
How playing League of Legends taught a valuable lesson on rookie mistakes.
What is the Evolving Role of Ethical Hackers in the New Age of Cybersecurity?
There are still challenges that ethical hackers face, including certifications and legal problems.
It’s Time for your First Security Conference
Are you ready to get in the social mood, or do some learning at your first conference?
Why Data Breaches are all About Trust
When it comes to computer security, we require trust more than most.
Ensuring the UK Cybersecurity Profession Retains a Hotbed of Talent
We need to hire efficiently, create champions in the workplace and look at how cybersecurity qualifications are designed
Influence of Artificial Intelligence and Machine Learning in Cybersecurity
Why AI and Machine Learning are reflective of the predicted advancements in IT.
Creating Your Perfect Big Data Engineer Resume
How to craft the ultimate Big Data engineer resume, and get the job.
What Separates the Good From the Bad: Mental Health and Cybersecurity
Mental health can have critical implications on cybersecurity practices.
Why We Cannot be Trusted to Make Our Own Passwords
Does your password contain numbers 1, 2 or 3, or what about letters E or T?