Infosecurity Next-Gen Infosec

  1. Web Hosting Security Threats to Watch Out for During This Season

    Threats to web hosting services are genuine and can cause widespread destruction if malicious attempts are successful

    1. Photo of Gert Svaiko

      Gert Svaiko

      Freelance Writer

  2. Why Companies Need to Understand and Create a Protocol for Insider Threats

    Companies need to establish a clear protocol for combating insider threats

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  3. Insider Threat Mitigation: The Role of AI and ML

    What roles does AI and Machine Learning play in addressing insider threats?

    1. Photo of Michael Usiagwu

      Michael Usiagwu

      Digital Marketing Consultant

  4. Interview: AJ Yawn, ByteChek

    Talking to AJ Yawn about the concept behind the launch of his new company

  5. When is a VPN Unsafe?

    At some point, a VPN becomes a security liability.

    1. Photo of Daniel Moyanda

      Daniel Moyanda

      Entrepreneur, Digital Marketer, and Thought Leader

  6. Risk Management in the Pandemic

    An adequate cyber risk management enables organizations to recognize and control a risky and an uncertain situation

  7. Interview: Jenny Potts

    How Jenny is aiming to make a difference in how we learn about coding in infosec

  8. Counteracting File-Based Threats Using CDR Tech

    CDR works by assuming that all files are potentially infected

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  9. How Do You Protect Your Data Against Personalization?

    How to control the data social media companies hold about you

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  10. Interview: Damian Vavanos, Social Hackers Academy

    How one academy is aiming to bring cybersecuirty skills to the less privileged in society

  11. Technological Innovations Defining the Future of Cybersecurity and the New Normal for Businesses

    What role new technologies could play in transforming traditional cybersecurity.

    1. Photo of Joseph Chukwube

      Joseph Chukwube

      Entrepreneur, Digital Marketer and Blogger

  12. The Four Benefits of Data Mining: Google’s Side of the Data Story

    How much money do you make for Google by using their services?

    1. Photo of Misan Etchie

      Misan Etchie

      Experienced blogger, tech enthusiast, technical writer and digital marketer

What’s hot on Infosecurity Magazine?