Infosecurity Next-Gen Infosec

  1. Why Companies Need to Understand and Create a Protocol for Insider Threats

    Companies need to establish a clear protocol for combating insider threats

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  2. Insider Threat Mitigation: The Role of AI and ML

    What roles does AI and Machine Learning play in addressing insider threats?

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  3. Interview: AJ Yawn, ByteChek

    Talking to AJ Yawn about the concept behind the launch of his new company

  4. When is a VPN Unsafe?

    At some point, a VPN becomes a security liability.

    1. Photo of Daniel Moyanda

      Daniel Moyanda

      Entrepreneur, Digital Marketer, and Thought Leader

  5. Risk Management in the Pandemic

    An adequate cyber risk management enables organizations to recognize and control a risky and an uncertain situation

  6. Interview: Jenny Potts

    How Jenny is aiming to make a difference in how we learn about coding in infosec

  7. Counteracting File-Based Threats Using CDR Tech

    CDR works by assuming that all files are potentially infected

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  8. How Do You Protect Your Data Against Personalization?

    How to control the data social media companies hold about you

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  9. Interview: Damian Vavanos, Social Hackers Academy

    How one academy is aiming to bring cybersecuirty skills to the less privileged in society

  10. Technological Innovations Defining the Future of Cybersecurity and the New Normal for Businesses

    What role new technologies could play in transforming traditional cybersecurity.

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  11. The Four Benefits of Data Mining: Google’s Side of the Data Story

    How much money do you make for Google by using their services?

    1. Photo of Misan Etchie

      Misan Etchie

      Experienced blogger, tech enthusiast, technical writer and digital marketer

  12. Self-Sovereign Identities to Protect Future Social Media Platforms from Hacking

    The failure to do so will make the users become jittery about their privacy in the hands of the social media platforms and lose their confidence in them.

    1. Photo of Shinie Bentotahewa

      Shinie Bentotahewa

      Cyber Security Researcher, Cardiff Metropolitan University

    2. Photo of Chaminda Hewage

      Chaminda Hewage

      Associate Professor in Data Security at Cardiff Metropolitan University

    3. Photo of Imtiaz Khan

      Imtiaz Khan

      Associate Professor in Data Science at Cardiff Metropolitan University

    4. Photo of Ali Shahaab

      Ali Shahaab

      Blockchain Researcher at Cardiff Metropolitan University

What’s hot on Infosecurity Magazine?