Infosecurity Next-Gen Infosec

  1. The Fileless Shall Have Power

    Common tactics for a LotL attack, and defending against them

  2. Cybersecurity Implementation Versus Organizational Layers of Leadership

    How can a CEO ensure the successful implementation and buy-in to digital transformation adoption

  3. Why Cybersecurity Planning Should be an Integral part of the Marketing Function

    In the case of a breach, why marketing needs to be part of incident response.

  4. Organizational Leadership and Cybersecurity Success

    Increasing digital interconnectivity brings cyber threats and risks for organizations

  5. Contingency Planning for the Red Team

    How to be efficient in preventing, responding and post-red team activity actions

    1. Photo of Jordyn Short

      Jordyn Short

      Cyber Security Analyst

  6. What Yahoo's Failed Data Breach Settlement Means for Cybersecurity

    What does the legal state of Yahoo's breach settlement mean for the future of cybersecurity

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

  7. Sensible Ways to Use Cyber Risk Ratings, Despite Methodological Shortcomings

    Cyber risk ratings, though attractive as a concept, are constrained by methodological shortcomings. Despite this, they can be a useful instrument helping to generate valuable insights for decision-making.

    1. Photo of Adam Klus

      Adam Klus

      PhD student at the University of Eastern Finland

  8. Interview: Charlie Hosier, 2018 Cyber Security Challenge Winner

    Charlie Hosier, winner of the 2018 Cyber Security Challenge, talks to Infosecurity about his career aspirations and experience so far

  9. Business Continuity/Disaster Recovery - Hoping for the Best, Prepared for the Worst, and Unsurprised by Anything in Between

    What a member of the IT team learned from participating in business continuity/disaster recovery drills.

    1. Photo of Taharka Beamon

      Taharka Beamon

      Security Analyst, Reed Exhibitions USA

  10. Using Natural Language Processing to Derive Motive From Text

    How predictive analytics can work.

    1. Photo of James Stevenson

      James Stevenson

      Software Engineer

  11. Using Offender Profiling Techniques in Security Operations

    How offender profiling techniques can help you be more preemptive in detection and prevention.

    1. Photo of James Stevenson

      James Stevenson

      Software Engineer

  12. Lessons from League of Legends Part 2: Focusing on the Goal

    How playing League of Legends taught a valuable lesson on rookie mistakes.

    1. Photo of Fareedah  Shaheed

      Fareedah Shaheed

      CEO and Founder of Sekuva

  13. What is the Evolving Role of Ethical Hackers in the New Age of Cybersecurity?

    There are still challenges that ethical hackers face, including certifications and legal problems.

    1. Photo of Rehan Ijaz

      Rehan Ijaz

      Business Graduate and Entrepreneur

  14. It’s Time for your First Security Conference

    Are you ready to get in the social mood, or do some learning at your first conference?

    1. Photo of James Stevenson

      James Stevenson

      Software Engineer

  15. Why Data Breaches are all About Trust

    When it comes to computer security, we require trust more than most.

    1. Photo of James Stevenson

      James Stevenson

      Software Engineer

  16. Ensuring the UK Cybersecurity Profession Retains a Hotbed of Talent

    We need to hire efficiently, create champions in the workplace and look at how cybersecurity qualifications are designed

    1. Photo of Rebecca Mameli

      Rebecca Mameli

      Head of Higher Education Research and Qualifications at Pearson UK

  17. Influence of Artificial Intelligence and Machine Learning in Cybersecurity

    Why AI and Machine Learning are reflective of the predicted advancements in IT.

    1. Aneetta Andrews

      Psychology Student and Technology Enthusiast

  18. Creating Your Perfect Big Data Engineer Resume

    How to craft the ultimate Big Data engineer resume, and get the job.

    1. Photo of Grace Carter

      Grace Carter

      Tech Writer

  19. What Separates the Good From the Bad: Mental Health and Cybersecurity

    Mental health can have critical implications on cybersecurity practices.

  20. Why We Cannot be Trusted to Make Our Own Passwords

    Does your password contain numbers 1, 2 or 3, or what about letters E or T?

    1. Photo of James Stevenson

      James Stevenson

      Software Engineer

What’s hot on Infosecurity Magazine?