Skip to content
Cybersecurity Magazine

Cybersecurity Magazine

Science meets Practice

  • Topics
    • Expert Opinions
    • Internet of Things
    • Mobility and 5G
    • Interviews
    • Security Basics
  • Newsletter
  • Videos
  • Journals
  • About
    • Authors
    • Contact
    • Who we are
    • Partners
    • Submit
You are here:Home
Hackers History: Part 1
General 

Hackers History: Part 1

August 12, 2022August 12, 2022 Tom Madsen 0
A Systematic Literature Review of Routine Activity Theory’s Applicability in Cybercrimes
Journal Abstracts 

A Systematic Literature Review of Routine Activity Theory’s Applicability in Cybercrimes

August 8, 2022August 8, 2022 Editor's Desk 0
Do I Still Need a WAF?
General 

Do I Still Need a WAF?

August 5, 2022August 5, 2022 Ross Moore 0
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques
Journal Abstracts 

Classification of Phishing Email Using Word Embedding and Machine Learning Techniques

August 1, 2022August 1, 2022 Editor's Desk 0
7 Reasons Why Businesses Are Failing to Secure Their APIs
General 

7 Reasons Why Businesses Are Failing to Secure Their APIs

July 25, 2022July 25, 2022 Jason Kent 0

Interviews

Safer Internet Day: Interview with Lance Spitzner, Senior Instructor at SANS Institute
General 

Safer Internet Day: Interview with Lance Spitzner, Senior Instructor at SANS Institute

February 9, 2021February 9, 2021 Editor's Desk 0
Video: What is Open RAN for 5G and what is it’s role in security?
General 

Video: What is Open RAN for 5G and what is it’s role in security?

January 15, 2021January 15, 2021 Editor's Desk 0
Podcast: The hackers won’t let you go. Time to go after them
General 

Podcast: The hackers won’t let you go. Time to go after them

January 13, 2021January 14, 2021 Lou Covey 1
Interview: Encrypted Attacks are the New Cybersecurity Nightmare
General 

Interview: Encrypted Attacks are the New Cybersecurity Nightmare

January 11, 2021January 10, 2021 Editor's Desk 0
Load More

Expert Opinions

The Current Intersection of Universal Design and Cybersecurity and Why It Must Expand
General 

The Current Intersection of Universal Design and Cybersecurity and Why It Must Expand

July 1, 2022June 24, 2022 Luke Smith 0
Using Next Gen DPI to Ensure Visibility and Control for Security Service Edge
General 

Using Next Gen DPI to Ensure Visibility and Control for Security Service Edge

June 24, 2022June 24, 2022 Erik Larsson 0
Zero Trust Security Architecture
General 

Zero Trust Security Architecture

June 20, 2022June 20, 2022 Tom Madsen 0
Potential Impact of 5G Regulations to Cloud Providers and Private Networks
General 

Potential Impact of 5G Regulations to Cloud Providers and Private Networks

June 10, 2022June 10, 2022 Silke Holtmanns 0
Load More
How Social Media Impacts Business Cybersecurity
General 

How Social Media Impacts Business Cybersecurity

July 22, 2022July 18, 2022 Zac Amos 0
Driving Cybersecurity Up the Corporate Agenda
Business 

Driving Cybersecurity Up the Corporate Agenda

July 18, 2022July 18, 2022 Paul Farrington 0
The Obstacles to Putting SAP in the SIEM
General 

The Obstacles to Putting SAP in the SIEM

July 15, 2022July 15, 2022 Tim Wallen 0
Design and Deployment of Network Testbed for Web Data Security
General Journal Abstracts 

Design and Deployment of Network Testbed for Web Data Security

July 11, 2022July 11, 2022 Editor's Desk 0
Should You Be Using an Electronic Signature
General 

Should You Be Using an Electronic Signature

July 4, 2022June 24, 2022 Zac Amos 0

If you’ve submitted documents online in the past several years, you may have signed your name electronically. This practice has become increasingly common as businesses gradually move their recordkeeping processes online. That said, electronic signatures (e-signatures) aren’t a match for every business.

Evaluating Dynamic Tor Onion Services for Privacy Preserving Distributed Digital Identity Systems
General Journal Abstracts 

Evaluating Dynamic Tor Onion Services for Privacy Preserving Distributed Digital Identity Systems

June 17, 2022June 17, 2022 Editor's Desk 0
On the Controllability of Artificial Intelligence: An Analysis of Limitations
General Journal Abstracts 

On the Controllability of Artificial Intelligence: An Analysis of Limitations

June 6, 2022June 6, 2022 Editor's Desk 0
Majority Vote-Based Ensemble Approach for Distributed Denial of Service Attack Detection in Cloud Computing
Journal Abstracts 

Majority Vote-Based Ensemble Approach for Distributed Denial of Service Attack Detection in Cloud Computing

May 30, 2022May 30, 2022 Editor's Desk 0
An Introduction to the exFAT File System and How to Hide Data Within
Journal Abstracts 

An Introduction to the exFAT File System and How to Hide Data Within

May 27, 2022May 27, 2022 Editor's Desk 0
Deepfake Technology Is a Rising Cyberthreat
General 

Deepfake Technology Is a Rising Cyberthreat

May 23, 2022May 23, 2022 Zac Amos 0

More artificial intelligence (AI) and machine learning (ML) use cases are emerging, and cybercriminals are leveraging these technologies to create highly sophisticated attacks. Cyberattack detection and prevention can be more challenging for individuals and businesses when hackers use innovative methods.
Cybersecurity professionals are already grappling with data breaches, ransomware attacks and phishing scams. Recently, another growing threat has kept them awake at night — the rise of the deepfake and the challenge of spotting one in an increasingly digital world.
Here’s more on the rapid advancement of deepfake technology, the cybersecurity implications of these attacks and what the future holds.

The Expansion of Malware to the Cloud
General 

The Expansion of Malware to the Cloud

May 20, 2022May 18, 2022 Bar Kaduri 0

As more organizations move their assets to the cloud, malware distributors are turning their attention to the cloud as well. In this blog, we will discuss the main malware types you may encounter in your cloud with examples and ways to detect and protect your cloud from them.
But first, how does malware find its way into cloud assets?

OT/ICS Security Training
General 

OT/ICS Security Training

May 16, 2022May 15, 2022 Tom Madsen 0

This article is inspired by a recent article on the Computerworld site for Denmark, where one of the CISO’s for a big energy company lamented the lack of formal skills in the cybersecurity community on the security requirements for Operational Technology (OT) and Industrial Control Systems (ICS). This triggered light research from me on the options out there for relevant trainings and certifications.

It’s Time to Secure the Water Sector from Cyber Threats
General 

It’s Time to Secure the Water Sector from Cyber Threats

May 9, 2022May 9, 2022 Trevor Logan 0

he Biden administration is reportedly considering a first-ever integrated action plan for global water security, linking global access to clean, reliable water to U.S. national security for the first time. At home, the linkage between national security and security of the water and wastewater sector is self-evident by its very definition as critical infrastructure. Yet decades of chronic underinvestment and under-resourcing of federal support to the industry has left this life-supporting and life-sustaining infrastructure vulnerable to cyber threats.

Cybersecurity Magazine

Editor's Desk

Latest Podcast

CSM Podcast: The Threat of Nation States
Philip Ingram MBE talks to Philippa Jefferies about the threat of nation states and cybersecurity, and the power of information.

Find all podcasts here

Media Partnerships

International Cyber Expo 2022

27-28 September, 2022

ETSI Security Conference

3-5 October, 2022

Cybersecurity News

Newsletter

To subscribe to our newsletter, simply fill out the form below.

Read our archived Newsletter here.

  • About Cybersecurity Magazine
  • Newsletter
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy

The views and opinions expressed on Cybersecurity Magazine are those of the authors and do not necessarily reflect the official policy or position of Cybersecurity Magazine. Any content provided by our bloggers or authors are of their opinion and are not intended to malign any club, organization, company, individual or anyone or anything.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT