Data is a critical enterprise asset that underpins operations, drives decision-making, makes personalised end-to-end service delivery possible, unlocks competitive advantage and more. Unfortunately, all this data represents a rich prize for cyber criminals looking to steal, hijack, or hold data to ransom. Which is why cybersecurity has become a top strategic priority for today’s organisations, given the exponential rise of ransomware, phishing and other cyber threats.Read more
If you are a regular reader of Cybersecurity Magazine, you may have come across Security Assurance before. In this article, we take a look at what is behind this abstract term and why it is so important.
Security assurance is an umbrella term for several processes aimed at ensuring individual system components can adequately protect themselves from attacks. Doing so requires not just a one-time effort, but actually spans the complete system lifecycle. After all, what is considered an acceptable security posture may change over time depending on, for example, newly emerging threats or changes to how the system itself is utilized.
Distributed Denial of Service (DDoS) attacks first appeared on the radars of security experts around 1999, when a wave of cyberattacks brought down countless websites, including resources of major corporations, such as CNN, eBay, Amazon, and E-Trade.
Many years later, DDoS attacks have not lost their relevance, on the contrary, DDoS attacks are growing more and more destructive. Financial institutions are increasingly becoming the targets of malicious actors, their financial and commercial losses inflicted by DDoS, lost revenue, customer churn, and hits to reputation, far exceeding operating losses.
DDoS then is a real and pressing threat for banks. But why are DDoS attacks in this industry that much more prevalent?
Since an impenetrable security strategy tends to be a result of combining multiple protective mechanisms, you have to fight on numerous fronts. Let us take a look into these few security practices that are the basis of every cybersecurity scheme.Read more
5G networks are becoming a key part of our critical infrastructure, enabling wireless networking in a broad range of scenarios from mobile broadband to massive IoT. Until recently though there has only been moderate noticeable output by national regulators on the specific security risks 5G systems are subject to.
Cybersecurity Magazine takes a look at the efforts made by the EU and its “Toolbox” to better realize guidance beyond industry standards and ensure a common security baseline at scale.
2020 is a year that nobody could have predicted, and one that few will forget. Looking ahead to 2021, we will undoubtedly be presented with new challenges and evolving threats. 7 cybersecurity experts on what we can expect next year.Read more
Protecting agains cyber threats becomes more important every day. But where do you begin? A cybersecurity framework is a good start. Check out our cybersecurity framework guide.Read more
Digital Signatures are being used more commonly these days – and have been picking up significantly during the current crisis. But how do they work and what can they be used for?Read more
Frameworks make it easier to measure against a reference point. But which are the best frameworks for cybersecurity? Tom Madsen has the answerRead more
Every once in a while we publish topics which are of general interest, such as this article from SpecOps Software, who interviewed Environmental Psychologist Lee Chambers about online bullying and what you can do to protect your children.Read more