Skip to content
Cybersecurity Magazine

Cybersecurity Magazine

Science meets Practice

  • Topics
    • Expert Opinions
    • Internet of Things
    • Mobility and 5G
    • Interviews
    • Security Basics
  • Newsletter
  • Videos
  • Journals
  • About
    • Authors
    • Contact
    • Who we are
    • Partners
    • Submit
You are here:Home
Why effective preparation is the key to acing client data protection audits
General 

Why effective preparation is the key to acing client data protection audits

April 9, 2021April 9, 2021 Tim Bandos 0
Beware of Fake Extortion Letters
General 

Beware of Fake Extortion Letters

April 5, 2021April 5, 2021 Idan Aharoni 0
Defend your Institution by Also Applying Zero Trust to Machines, Not Just Humans
General 

Defend your Institution by Also Applying Zero Trust to Machines, Not Just Humans

April 2, 2021April 2, 2021 Kamel Heus 0
How To Achieve Zero Trust Endpoint and IoT Security
General 

How To Achieve Zero Trust Endpoint and IoT Security

March 29, 2021March 29, 2021 Dave Henderson 0
Distributed ledger technology brings risks with opportunities
General 

Distributed ledger technology brings risks with opportunities

March 26, 2021March 26, 2021 Diego Lopez 0

Interviews

Safer Internet Day: Interview with Lance Spitzner, Senior Instructor at SANS Institute
General 

Safer Internet Day: Interview with Lance Spitzner, Senior Instructor at SANS Institute

February 9, 2021February 9, 2021 Editors Desk 0
Video: What is Open RAN for 5G and what is it’s role in security?
General 

Video: What is Open RAN for 5G and what is it’s role in security?

January 15, 2021January 15, 2021 Editors Desk 0
Podcast: The hackers won’t let you go. Time to go after them
General 

Podcast: The hackers won’t let you go. Time to go after them

January 13, 2021January 14, 2021 Lou Covey and 1 more 1
Interview: Encrypted Attacks are the New Cybersecurity Nightmare
General 

Interview: Encrypted Attacks are the New Cybersecurity Nightmare

January 11, 2021January 10, 2021 Editors Desk 0
Load More

Expert Opinions

Operational Technology – A New Challenge?
General 

Operational Technology – A New Challenge?

February 22, 2021February 22, 2021 Tom Madsen 0
California grant program is security nightmare
General 

California grant program is security nightmare

February 12, 2021February 11, 2021 Lou Covey 0
The History and Future of DDoS Attacks
General 

The History and Future of DDoS Attacks

January 15, 2021January 15, 2021 CompTIA 0
Patience and persistence trump technology in SolarWinds attack
General 

Patience and persistence trump technology in SolarWinds attack

January 4, 2021January 4, 2021 Lou Covey 0
Load More
Mind the Gaps: Refocusing Security Efforts in 2021
General 

Mind the Gaps: Refocusing Security Efforts in 2021

March 22, 2021March 22, 2021 Josh Neame 0
Good Design = Good Security?
General 

Good Design = Good Security?

March 19, 2021March 19, 2021 Tom Madsen 0
DDoS Protection Technologies: Setting up a Robust Defense
General 

DDoS Protection Technologies: Setting up a Robust Defense

March 15, 2021March 15, 2021 Ramil Khantimirov 0
DDoS Protection Technologies: Types of Protection
General 

DDoS Protection Technologies: Types of Protection

March 12, 2021March 12, 2021 Ramil Khantimirov 0
DDoS Protection Technologies – What is DDoS?
General 

DDoS Protection Technologies – What is DDoS?

March 8, 2021March 9, 2021 Ramil Khantimirov 0

Our latest article is part of a series of three looking at DDoS protection technologies; what DDoS is, the types of protection, and how you can set up a robust defence.
This first article outlines exactly what DDoS is and why is should be incorporated at design stage.

How To Deliver Exceptional Cybersecurity Customer Experience
General 

How To Deliver Exceptional Cybersecurity Customer Experience

March 1, 2021March 1, 2021 Stephen Roostan 0
<strong>How Does Cybercrime Lead to Insurance Fraud?</strong>
General 

How Does Cybercrime Lead to Insurance Fraud?

February 26, 2021February 26, 2021 David Lukic 0
Deception in the Workforce: Utilising Security Capabilities to Mitigate Insider Threats
Business General 

Deception in the Workforce: Utilising Security Capabilities to Mitigate Insider Threats

February 19, 2021February 19, 2021 Anurag Kahol 0
Control Risks’ 2021 RiskMap Report: Top Five Risks for Global Businesses in 2021
General 

Control Risks’ 2021 RiskMap Report: Top Five Risks for Global Businesses in 2021

February 17, 2021February 17, 2021 Bill Udell 0
A Realistic Deployment of Named Data Networking in The Internet Of Things
Journal Abstracts 

A Realistic Deployment of Named Data Networking in The Internet Of Things

February 12, 2021February 12, 2021 Editors Desk 0

“2020 Best Paper Award” for the Journal of Cyber Security and Mobility: A Realistic Deployment of Named Data Networking in The Internet Of Things.

Real-Time Vendor Scanning Is Not Optional
General 

Real-Time Vendor Scanning Is Not Optional

February 8, 2021February 8, 2021 Mike Kelly and 1 more 0

The breach hidden within software updates for SolarWinds customers was introduced through a third-part vendor. NIST’s most recent guidance on identifying cyber risk explains why real-time monitoring is essential and acknowledges the threat posed by third-party vendors. Some of the key questions emerging from the SolarWinds surround the prospect of real-time vendor scanning.

In this article Mike Kelly and Dan Gardener discuss the possibilities and improvements needed in real-time vendor scanning.

The SocialArk Data Breach Uncovered the Open Source Paradox
General 

The SocialArk Data Breach Uncovered the Open Source Paradox

February 5, 2021February 5, 2021 Dotan Nahum 0

You’re either secure or you’re vulnerable, either under attack or safe. But is it really that simple? With the recent SocialArk breach, it quickly became clear it wasn’t. Read our latest article on the security implications when using open source software.

Data Protection Day: Schrems II: The SME dilemma
GDPR General 

Data Protection Day: Schrems II: The SME dilemma

February 1, 2021February 5, 2021 Mareike Vogt 0

Data Protection Day is a time to remind organizations across all industries and sizes about the important of data protection. Lately we’ve seen a lot of regulations like the GDPR or Schrems II, all small steps towards a proper data protection to secure personal data and give the topic the deserved recognition.
With the ruling of the European Court of Justice in the Schrems II case, pressure is growing on small and medium-sized companies to re-evaluate their processes and procedures and adapt them to the regulations of the EU GDPR. Mareike Vogt, data protection expert at TÜV SÜD, takes a closer look at this current topic.

Cybersecurity Magazine

Latest Podcast

California small business grant program is a security nightmare

If you are a small business hoping for a grant from California, listen to this podcast. The state has chosen to work with third-party financial institutions to transfer the funds to banks, but those organizations are asking to violate basic security practices. Moreover, some business banks have internal security mechanisms that prevent the connections between the state and the banks. Find out how to do this safely in this podcast.

Find all podcasts here

Cybersecurity News

Newsletter

To subscribe to our newsletter, simply fill out the form below.

Read our archived Newsletter here.

  • About Cybersecurity Magazine
  • Newsletter
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy

The views and opinions expressed on Cybersecurity Magazine are those of the authors and do not necessarily reflect the official policy or position of Cybersecurity Magazine. Any content provided by our bloggers or authors are of their opinion and are not intended to malign any club, organization, company, individual or anyone or anything.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.