Infosecurity Next-Gen Infosec
Why Companies Need to Understand and Create a Protocol for Insider Threats
Companies need to establish a clear protocol for combating insider threats
Insider Threat Mitigation: The Role of AI and ML
What roles does AI and Machine Learning play in addressing insider threats?
Interview: AJ Yawn, ByteChek
Talking to AJ Yawn about the concept behind the launch of his new company
When is a VPN Unsafe?
At some point, a VPN becomes a security liability.
Risk Management in the Pandemic
An adequate cyber risk management enables organizations to recognize and control a risky and an uncertain situation
Interview: Jenny Potts
How Jenny is aiming to make a difference in how we learn about coding in infosec
Counteracting File-Based Threats Using CDR Tech
CDR works by assuming that all files are potentially infected
How Do You Protect Your Data Against Personalization?
How to control the data social media companies hold about you
Interview: Damian Vavanos, Social Hackers Academy
How one academy is aiming to bring cybersecuirty skills to the less privileged in society
Technological Innovations Defining the Future of Cybersecurity and the New Normal for Businesses
What role new technologies could play in transforming traditional cybersecurity.
The Four Benefits of Data Mining: Google’s Side of the Data Story
How much money do you make for Google by using their services?
Self-Sovereign Identities to Protect Future Social Media Platforms from Hacking
The failure to do so will make the users become jittery about their privacy in the hands of the social media platforms and lose their confidence in them.