Skip to content
Cybersecurity Magazine

Cybersecurity Magazine

Science meets Practice

  • Topics
    • Expert Opinions
    • Internet of Things
    • Mobility and 5G
    • Interviews
    • Security Basics
  • Newsletter
  • Job Market
  • Journals
  • About
    • Authors
    • Contact
    • Who we are
    • Partners
    • Submit
You are here:Home
The History and Future of DDoS Attacks
General 

The History and Future of DDoS Attacks

January 15, 2021January 15, 2021 CompTIA 0
Video: What is Open RAN for 5G and what is it’s role in security?
General 

Video: What is Open RAN for 5G and what is it’s role in security?

January 15, 2021January 15, 2021 Editors Desk 0
Podcast: The hackers won’t let you go. Time to go after them
General 

Podcast: The hackers won’t let you go. Time to go after them

January 13, 2021January 14, 2021 Lou Covey and 1 more 0
Interview: Encrypted Attacks are the New Cybersecurity Nightmare
General 

Interview: Encrypted Attacks are the New Cybersecurity Nightmare

January 11, 2021January 10, 2021 Editors Desk 0
Patience and persistence trump technology in SolarWinds attack
General 

Patience and persistence trump technology in SolarWinds attack

January 4, 2021January 4, 2021 Lou Covey 0

Interviews

Video: Protecting the IoT Edge
General 

Video: Protecting the IoT Edge

October 9, 2020October 9, 2020 Editors Desk 0
Interview with Vandana Verma from Infosec Girls
General 

Interview with Vandana Verma from Infosec Girls

September 25, 2020September 24, 2020 Editors Desk 0
Video: The impact of BYOD on security
General 

Video: The impact of BYOD on security

August 21, 2020August 21, 2020 Editors Desk 0
Interview: Cybersecurity in a geopolitical context
General 

Interview: Cybersecurity in a geopolitical context

August 14, 2020August 13, 2020 Editors Desk 0
Load More

Expert Opinions

Expert on SolarWinds breach: 21st Century Espionage
General 

Expert on SolarWinds breach: 21st Century Espionage

December 28, 2020December 24, 2020 Editors Desk 0
COVID-19 Phishing Scams and Malware
General 

COVID-19 Phishing Scams and Malware

December 21, 2020December 16, 2020 Christie Simon 0
Embracing automation to level the cyber security playing field
General 

Embracing automation to level the cyber security playing field

December 18, 2020December 12, 2020 Dave Henderson 0
Security for Everybody or Security for Nobody
General 

Security for Everybody or Security for Nobody

December 14, 2020December 7, 2020 Tom Madsen and 1 more 0
Load More
A christmas goodie: „Het Virus“ by Eddy Willems
General 

A christmas goodie: „Het Virus“ by Eddy Willems

December 24, 2020December 24, 2020 Patrick Boch 0
COVID19 and US Politics dominated security news in 2020
General 

COVID19 and US Politics dominated security news in 2020

December 11, 2020December 7, 2020 Lou Covey 0
Cybersecurity’s crystal ball: Security experts predict what’s in store in 2021
General 

Cybersecurity’s crystal ball: Security experts predict what’s in store in 2021

December 7, 2020December 6, 2020 Editors Desk 0
Are Cybersecurity Audits a Hassle or a Blessing in Disguise?
General 

Are Cybersecurity Audits a Hassle or a Blessing in Disguise?

December 4, 2020November 24, 2020 FNU Divyanka 1
Why Emotet Waves Keep Crashing and How to Make Them Stop
General 

Why Emotet Waves Keep Crashing and How to Make Them Stop

December 1, 2020November 22, 2020 Shimon Oren 0

Emotet is one of the most dangerous and persistent cyberthreats currently in the wild. Why that is and how to stop it explains Shimon Oren in his excellent article.

Do we Really need new tools?
General 

Do we Really need new tools?

November 27, 2020November 19, 2020 Tom Madsen 0
Sweet Deal: Keeping Retailers Secure this Black Friday
General 

Sweet Deal: Keeping Retailers Secure this Black Friday

November 26, 2020November 22, 2020 Editors Desk 0
Utilize Open Source Intelligence (OSINT) techniques to support digital forensics investigations
General 

Utilize Open Source Intelligence (OSINT) techniques to support digital forensics investigations

November 23, 2020November 11, 2020 Dr. Varin Khera 1
Why Cyber Security Audit should be a priority for you
General 

Why Cyber Security Audit should be a priority for you

November 22, 2020November 22, 2020 Editors Desk 0
Opinion: Cybersecurity must not be political
General 

Opinion: Cybersecurity must not be political

November 20, 2020November 20, 2020 Patrick Boch 1

The Krebs incident in the USA and a discussion of encryption backdoors in the EU will make life for cybersecurity harder. A commentary.

Private 5G Networks – Making Secure Wireless Factory Automation A Reality
General 

Private 5G Networks – Making Secure Wireless Factory Automation A Reality

November 20, 2020November 19, 2020 Hans Christian Rudolph 0

Businesses are eager to utilize 5G for local deployments – if those are implemented securely. In its latest whitepaper, wenovator explores what it takes to ensure holistic security in private 5G networks.

Setting up a Cybersecurity Framework
General 

Setting up a Cybersecurity Framework

November 16, 2020November 9, 2020 Jordan MacAvoy 0

Protecting agains cyber threats becomes more important every day. But where do you begin? A cybersecurity framework is a good start. Check out our cybersecurity framework guide.

The Digital Signatures Boom: Email, Document and Code Signing
General 

The Digital Signatures Boom: Email, Document and Code Signing

November 13, 2020November 5, 2020 Vinay Purohit 0

Digital Signatures are being used more commonly these days – and have been picking up significantly during the current crisis. But how do they work and what can they be used for?

Cybersecurity Magazine

Advertisement

Cybersecurity News

Newsletter

To subscribe to our newsletter, simply fill out the form below.

Read our archived Newsletter here.

  • About Cybersecurity Magazine
  • Newsletter
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy

The views and opinions expressed on Cybersecurity Magazine are those of the authors and do not necessarily reflect the official policy or position of Cybersecurity Magazine. Any content provided by our bloggers or authors are of their opinion and are not intended to malign any club, organization, company, individual or anyone or anything.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.