Security Assessments – How, Why & What
When it comes to security assessments, there are often misunderstandings between consultant and customer. This article covers both perspectives, giving a unique insight for both parties.
Read MoreWhen it comes to security assessments, there are often misunderstandings between consultant and customer. This article covers both perspectives, giving a unique insight for both parties.
Read MoreIn this second conversation with Prof. Banafa, we focus on the supply chain and the internet of things pertaining to privacy.
Read MoreSelf-Protecting Data (SPD) are a relatively new concept for the cybersecurity industry.
We spoke with Jim Minie from Sertainty about use cases and implications of self protecting data for cybersecurity.
Most users only ever scratch the surface of the internet – there’s much more hidden in the deep. Find out what in our 5th article about OSINT.
Read MoreWe serve as the bridge between research and industry – true to our word, here’sspecial issue on Big Data and AI of the Journal of ICT Standardization.
Read MoreToday marks the 2nd anniversary for GDPR – and Cybersecurity Magazine put together a special. Read interviews, insight articles and commentaries on GDPR here.
Read MorePasswords don’t matter. Shortly after world password day, this might come as a shock. Adam Glick from Rocket Software explains why.
Read MoreWe had the chance to talk to Theresa Payton, Former White House Chief Information Officer and CEO of Fortalice Solutions about the recent attacks on healthcare organisations.
Read MoreGetting information and awareness of cybersecurity across to your audience can be difficult – read how to improve on this in our interview with Nicole van Deursen.
Read MoreHow can you secure your work setting when working from home? Find out in this article about the art of cyber distancing.
Read More