Infosecurity Next-Gen Infosec
Infosecurity Next-Gen is a community-focussed content stream launched with the objective of giving those who are keen to enter the industry a platform on which to publish their research, work and blog posts. This content will offer fresh perspective, brand new innovative research and a view from outside of the industry.
How to Prevent Data Leakages
Joseph Chukwube discusses how businesses can detect and respond to data leaks and safeguard valuable data assets
Top Cloud Misconceptions that Could Damage Your Organization
Shigraf Aijaz highlights common cloud computing misconceptions that can prevent organizations boosting their cybersecurity
Improve Asset Visibility in OT Security With Hybrid AI-Cloud Approaches
Joseph Chukwube says that the complexity of OT security has hindered organizations’ abilities to mitigate threats effectively
How to Build a Positive Security Culture Without Becoming Big Brother
Business leaders must learn how to walk the line between implementing security measures on employees without being overbearing
The Urgent Need to Enhance Cloud Data Security In 2023
Farwa Sajjad says organizations must implement a range of measures to secure their cloud environments amid growing threats
How to Defend Against Modern Ransomware Attacks
Shigraf Aijaz sets out the best approaches to defend against modern ransomware attacks
Social Media Phishing – The 2023 Cybersecurity Threat
Zehra Ali discusses the different forms of social media phishing and tips on how to stay safe from this threat
How SMEs Can Secure the Remote Workforce
SMEs face a growing challenge to secure their remote workforce against cyber threats
How to Protect Your Intellectual Property and Trade Secrets from Cyber Theft
With the stakes getting higher, organizations must treat IP protection more seriously
5 Challenges CISOs Are Facing in 2023
Ali Cameron highlights the five biggest challenges for CISOs in 2023
A 2023 Guide to Secure Cloud Deployment for Improved Application Security
Secure cloud deployment is critical to protect applications and data stored in the cloud
The Future of VPNs: What to Expect in the Next Decade
With the use of VPNs on the rise to help address privacy and security concerns, Michael Chukwube explores the future of this technology
Reducing the Risk of Severe Data Breaches
Data breaches often result in severe financial and reputational losses for victims
Essential Practices for Defense Against Social Engineering Attacks
Organizations must have a multi-faceted approach to tackling the scourge of social engineering attacks
The Growing Threat of Broken Authentication Attacks on APIs
Broken authentication is one of the most common methods of attack for criminals looking to breach APIs
How to Implement a Foolproof IoT Cybersecurity Strategy
IoT devices are improving our lives but face significant cyber-threats
Email Security: Protecting Your Organization from Within
Email security is crucial for modern organizations, and a robust security plan requires proactive measures
How Can SMEs Improve Their Cybersecurity Resilience?
Cybersecurity breaches affecting SMEs at scale can have catastrophic costs for society
How to Overcome Challenges to Zero Trust Adoption
Organizations must conduct a zero trust assessment of their environment and existing capabilities and create a roadmap to achieve it
API Attacks Have Emerged as the #1 Threat Vector in 2022
Today’s businesses must harden APIs against threats at every level of their organization