Skip to content
Cybersecurity Magazine

Cybersecurity Magazine

Science meets Practice

  • Topics
    • Expert Opinions
    • Internet of Things
    • Mobility and 5G
    • Interviews
    • Security Basics
  • Newsletter
  • Videos
  • Journals
  • About
    • Authors
    • Contact
    • Who we are
    • Partners
    • Submit
You are here:Home
Should You Be Using an Electronic Signature
General 

Should You Be Using an Electronic Signature

July 4, 2022June 24, 2022 Zac Amos 0
The Current Intersection of Universal Design and Cybersecurity and Why It Must Expand
General 

The Current Intersection of Universal Design and Cybersecurity and Why It Must Expand

July 1, 2022June 24, 2022 Luke Smith 0
Using Next Gen DPI to Ensure Visibility and Control for Security Service Edge
General 

Using Next Gen DPI to Ensure Visibility and Control for Security Service Edge

June 24, 2022June 24, 2022 Erik Larsson 0
Zero Trust Security Architecture
General 

Zero Trust Security Architecture

June 20, 2022June 20, 2022 Tom Madsen 0
Evaluating Dynamic Tor Onion Services for Privacy Preserving Distributed Digital Identity Systems
General Journal Abstracts 

Evaluating Dynamic Tor Onion Services for Privacy Preserving Distributed Digital Identity Systems

June 17, 2022June 17, 2022 Editor's Desk 0

Interviews

Safer Internet Day: Interview with Lance Spitzner, Senior Instructor at SANS Institute
General 

Safer Internet Day: Interview with Lance Spitzner, Senior Instructor at SANS Institute

February 9, 2021February 9, 2021 Editor's Desk 0
Video: What is Open RAN for 5G and what is it’s role in security?
General 

Video: What is Open RAN for 5G and what is it’s role in security?

January 15, 2021January 15, 2021 Editor's Desk 0
Podcast: The hackers won’t let you go. Time to go after them
General 

Podcast: The hackers won’t let you go. Time to go after them

January 13, 2021January 14, 2021 Lou Covey 1
Interview: Encrypted Attacks are the New Cybersecurity Nightmare
General 

Interview: Encrypted Attacks are the New Cybersecurity Nightmare

January 11, 2021January 10, 2021 Editor's Desk 0
Load More

Expert Opinions

Potential Impact of 5G Regulations to Cloud Providers and Private Networks
General 

Potential Impact of 5G Regulations to Cloud Providers and Private Networks

June 10, 2022June 10, 2022 Silke Holtmanns 0
OT/ICS Security Training
General 

OT/ICS Security Training

May 16, 2022May 15, 2022 Tom Madsen 0
It’s Time to Secure the Water Sector from Cyber Threats
General 

It’s Time to Secure the Water Sector from Cyber Threats

May 9, 2022May 9, 2022 Trevor Logan 0
Is Fully Homomorphic Encryption now a reality?
General 

Is Fully Homomorphic Encryption now a reality?

May 2, 2022May 10, 2022 Nigel Smart 0
Load More
On the Controllability of Artificial Intelligence: An Analysis of Limitations
General Journal Abstracts 

On the Controllability of Artificial Intelligence: An Analysis of Limitations

June 6, 2022June 6, 2022 Editor's Desk 0
Majority Vote-Based Ensemble Approach for Distributed Denial of Service Attack Detection in Cloud Computing
Journal Abstracts 

Majority Vote-Based Ensemble Approach for Distributed Denial of Service Attack Detection in Cloud Computing

May 30, 2022May 30, 2022 Editor's Desk 0
An Introduction to the exFAT File System and How to Hide Data Within
Journal Abstracts 

An Introduction to the exFAT File System and How to Hide Data Within

May 27, 2022May 27, 2022 Editor's Desk 0
Deepfake Technology Is a Rising Cyberthreat
General 

Deepfake Technology Is a Rising Cyberthreat

May 23, 2022May 23, 2022 Zac Amos 0
The Expansion of Malware to the Cloud
General 

The Expansion of Malware to the Cloud

May 20, 2022May 18, 2022 Bar Kaduri 0

As more organizations move their assets to the cloud, malware distributors are turning their attention to the cloud as well. In this blog, we will discuss the main malware types you may encounter in your cloud with examples and ways to detect and protect your cloud from them.
But first, how does malware find its way into cloud assets?

A Standard for Home Gateway Security
General 

A Standard for Home Gateway Security

May 6, 2022May 6, 2022 Scott Cadzow 0
Similarity Analysis of Single-Vendor Marketplaces in the Tor-Network
Journal Abstracts 

Similarity Analysis of Single-Vendor Marketplaces in the Tor-Network

April 25, 2022April 25, 2022 Editor's Desk 0
How to Balance Cybersecurity and Productivity
General 

How to Balance Cybersecurity and Productivity

April 22, 2022April 22, 2022 Zac Amos 0
Pain-Free Cloud Security Transformation? There’s No Such Thing
General 

Pain-Free Cloud Security Transformation? There’s No Such Thing

April 15, 2022April 15, 2022 Joe Darrah 0
The Threat of Covert Channels in Network Time Synchronisation Protocols
Journal Abstracts 

The Threat of Covert Channels in Network Time Synchronisation Protocols

April 11, 2022April 11, 2022 Editor's Desk 0

Abstract: Synchronized clocks are vital for most communication scenarios in networks of Information Technology (IT) and Operational Technology (OT). The process of time synchronisation requires transmission of high-precision timestamps often originating from external sources. In this paper, we analyze how time synchronization protocols impose a threat by being leveraged as carrier for network covert channels.

Security Considerations in Choosing Cloud Data Platforms
Business General 

Security Considerations in Choosing Cloud Data Platforms

April 8, 2022April 8, 2022 Zac Amos 0

Cloud security is more important than ever. Cybercrime is on the rise, and changes in the business world — the pivot to work from home — have made companies of all kinds more vulnerable to cyberattacks.
Data security has become a critical consideration for businesses migrating to the cloud or building a multi-cloud environment. It’s vital to know what to keep in mind when choosing a cloud data platform. Here are some things savvy companies should consider when making their selection.

The Top Security Challenges Data Centers Face in 2022
General 

The Top Security Challenges Data Centers Face in 2022

April 4, 2022April 4, 2022 Emily Newton 0

Data centers and providers employ some of the most sophisticated cybersecurity measures available to protect systems, hardware, and customer information. However, that does not mean

The Impact of Securing European 5G Mobile Networks
General 

The Impact of Securing European 5G Mobile Networks

April 1, 2022April 1, 2022 Silke Holtmanns 0

5G Mobile Networks are being rolled out throughout the world. We see new industries picking up 5G for their own purposes and bringing in new

Cybersecurity Magazine

Editor's Desk

Latest Podcast

CSM Podcast: Security in Supply Chains
Philippa Jefferies and Hans Christian Rudolph talk to Jonathan Wood about security in supply chains.

Find all podcasts here

Media Partnerships

IEC 62443 Week 2022

13-17 June, 2022

International Cyber Expo 2022

27-28 September, 2022

ETSI Security Conference

3-5 October, 2022

Cybersecurity News

Newsletter

To subscribe to our newsletter, simply fill out the form below.

Read our archived Newsletter here.

  • About Cybersecurity Magazine
  • Newsletter
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy

The views and opinions expressed on Cybersecurity Magazine are those of the authors and do not necessarily reflect the official policy or position of Cybersecurity Magazine. Any content provided by our bloggers or authors are of their opinion and are not intended to malign any club, organization, company, individual or anyone or anything.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT