Skip to content
Cybersecurity Magazine

Cybersecurity Magazine

Science meets Practice

  • Topics
    • Expert Opinions
    • Internet of Things
    • Mobility and 5G
    • History of Hacking
    • Interviews
    • Security Basics
  • Newsletter
  • Videos
  • Journals
  • About
    • Authors
    • Contact
    • Who we are
    • Partners
    • Submit
  • ETSI Security Conference 2022
  • Expert Career Profiles
4 Biggest Supply Chain Security Threats to Watch in 2023
General 

4 Biggest Supply Chain Security Threats to Watch in 2023

January 27, 2023January 27, 2023 Zac Amos 0 Comments 8 min read
An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering
Journal Abstracts 

An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering

January 23, 2023January 22, 2023 Editor's Desk 0 Comments 1 min read
We Need Quality Data Recovery in an Age of<br>Increased Cyberattacks
General 

We Need Quality Data Recovery in an Age of
Increased Cyberattacks

January 20, 2023January 24, 2023 Emily Newton 0 Comments 6 min read
5 Email Security Threats That Are a Cause For Concern
General 

5 Email Security Threats That Are a Cause For Concern

January 16, 2023January 13, 2023 Katrina Thompson 0 Comments 5 min read
Career Profile: Dr. Silke Holtmanns, PwC Finland
Careers General 

Career Profile: Dr. Silke Holtmanns, PwC Finland

January 13, 2023January 11, 2023 Editor's Desk 0 Comments 4 min read

Interviews

Safer Internet Day: Interview with Lance Spitzner, Senior Instructor at SANS Institute
General 

Safer Internet Day: Interview with Lance Spitzner, Senior Instructor at SANS Institute

February 9, 2021February 9, 2021 Editor's Desk 0 Comments 2 min read
Video: What is Open RAN for 5G and what is it’s role in security?
General 

Video: What is Open RAN for 5G and what is it’s role in security?

January 15, 2021January 15, 2021 Editor's Desk 0 Comments 0 min read
Podcast: The hackers won’t let you go. Time to go after them
General 

Podcast: The hackers won’t let you go. Time to go after them

January 13, 2021January 14, 2021 Lou Covey 1 Comment 1 min read
Interview: Encrypted Attacks are the New Cybersecurity Nightmare
General 

Interview: Encrypted Attacks are the New Cybersecurity Nightmare

January 11, 2021January 10, 2021 Editor's Desk 0 Comments 6 min read
Load More

Expert Opinions

Why Mid-Market Enterprises are Becoming Top Targets for Cyber Criminals (and What They Can Do to Prevent It)
General 

Why Mid-Market Enterprises are Becoming Top Targets for Cyber Criminals (and What They Can Do to Prevent It)

December 23, 2022December 21, 2022 Robert Sugrue 0 Comments 5 min read
Attacks on Shadow APIs Loom Large
General 

Attacks on Shadow APIs Loom Large

November 25, 2022November 25, 2022 Andy Mills 0 Comments 5 min read
IoT Regulation: The Carrot and the Stick
General 

IoT Regulation: The Carrot and the Stick

October 28, 2022October 28, 2022 David Adams 0 Comments 5 min read
Superintelligence Will Not Be Controlled
General 

Superintelligence Will Not Be Controlled

October 21, 2022October 21, 2022 Roman V. Yampolskiy 0 Comments 8 min read
Load More
Why a Picture Is Worth a Thousand Files
General 

Why a Picture Is Worth a Thousand Files

January 9, 2023January 9, 2023 Alyn Hockey 0 Comments 4 min read
Applying UX Design To Cybersecurity
General 

Applying UX Design To Cybersecurity

January 6, 2023January 6, 2023 Luke Smith 0 Comments 7 min read
Career Profile: Sonia Compans, Technical Officer at ETSI
Career Profiles Careers General 

Career Profile: Sonia Compans, Technical Officer at ETSI

December 23, 2022December 20, 2022 Editor's Desk 0 Comments 3 min read
The Power of eBPF for Cloud Native Systems
General 

The Power of eBPF for Cloud Native Systems

December 19, 2022December 21, 2022 David Soldani 0 Comments 12 min read
Career Profile: Tom Madsen, NNIT Denmark
Career Profiles Careers General 

Career Profile: Tom Madsen, NNIT Denmark

December 16, 2022December 16, 2022 Editor's Desk 0 Comments 5 min read

Name: Tom Madsen Affiliation: Cybersecurity SME with NNIT Denmark Editorial Board of Cybersecurity Magazine Can you briefly introduce your current

10 Steps for Better Website DDoS Protection
General 

10 Steps for Better Website DDoS Protection

December 12, 2022December 12, 2022 Ramil Khantimirov 0 Comments 9 min read
Career Profile: Anand Prasad, Deloitte
General 

Career Profile: Anand Prasad, Deloitte

December 9, 2022December 12, 2022 Editor's Desk 0 Comments 3 min read
Career Profile: Hans Christian Rudolph, Deloitte
Career Profiles General 

Career Profile: Hans Christian Rudolph, Deloitte

December 9, 2022December 12, 2022 Editor's Desk 0 Comments 5 min read
An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering
General Journal Abstracts 

An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering

December 5, 2022January 17, 2023 Editor's Desk 0 Comments 0 min read
How Do You Know That Access Was Granted in the First Place?
General 

How Do You Know That Access Was Granted in the First Place?

December 2, 2022December 2, 2022 Michael Rask Christensen 0 Comments 6 min read

A colleague and I recently had a discussion of Zero Trust Architecture (ZTA). There is no one-shoe-fits-all solution out there. Zero Trust is a journey more than it is a turn-key solution. But there are some common features and the NIST 800-207 standard or Microsoft’s Zero Trust advisory are not bad places to start reading. However – with my background at one of the major IGA solution vendors, I started wondering why Identity Governance and Administration (IGA) was never in the pictures when ZTA was discussed. The policy engine always assumes that if an account is member of a certain AD group or Azure role then it is OK and the role of “zero trust” is to check the identity’s device, location, time of day and other ad-hoc factors to decide whether to accept the request, enforce multi-factor authentication or even reject the request.

Attack Mitigation and Security for Vehicle Platoon
Journal Abstracts 

Attack Mitigation and Security for Vehicle Platoon

November 21, 2022November 21, 2022 Editor's Desk 0 Comments 1 min read

Abstract: This research entails an investigation into enhanced attack detection techniques as a security feature in vehicular platooning. The paper evaluates critical challenges in the security of Vehicular Ad hoc Networks (VANETs) with a focus on vulnerabilities in vehicle platooning. We evaluate the possibilities of securing a platoon through enhanced attack detection following an inside attack while considering current communication-based approaches to vehicular platoon security that have been effective at isolating infected platoon members.

How to Build a Computer Security Incident Response Team (CSIRT)
General 

How to Build a Computer Security Incident Response Team (CSIRT)

November 18, 2022November 18, 2022 Zac Amos 0 Comments 12 min read

An effective Computer Security Incident Response Team can mean the difference between safety and vulnerability in today’s cybersecurity landscape. The CSIRT ensures your organization is prepared for cyber incidents and can react quickly to minimize the damage. This article will go over precisely what a CSIRT is, what the roles on the team are, how to assemble a CSIRT and what the CSIRT’s responsibilities are.

Cybersecurity Threats Faced by Small Businesses Expanding Online
General 

Cybersecurity Threats Faced by Small Businesses Expanding Online

November 11, 2022November 11, 2022 Luke Smith 0 Comments 6 min read

It is an exciting prospect to move your business to the online space, but while you will have the chance to reach more customers, you will also need to understand the very possible chance of a data breach or other cybercrime. It only takes one incident to cause your company a world of trouble, and you don’t want to start your expansion off on the wrong foot.

Cybersecurity Magazine

Latest Podcast

CSM Podcast: Looking Ahead to 2023
In our latest podcast, Matt Campagna, ETSI TC Cyber QSC Chair, Amazon, talks to Philippa Jefferies and Rajeev Prasad about quantum safe cryptography.

Find all podcasts here

Media Partnerships

Privacy-Enhancing Technology Summit Europe

28 February – 1 March 2023

National Cyber Security Show 2023

25-27 April 2023

Cybersecurity News

Newsletter

To subscribe to our newsletter, simply fill out the form below.

Read our archived Newsletter here.

  • About Cybersecurity Magazine
  • Newsletter
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy
Copyright © 2023 Cybersecurity Magazine.
All rights reserved.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT