Skip to content
Cybersecurity Magazine

Cybersecurity Magazine

Science meets Practice

  • Topics
    • Expert Opinions
    • Internet of Things
    • Mobility and 5G
    • History of Hacking
    • Interviews
    • Security Basics
  • Videos
    • Videos
    • ETSI Security Conference 2022
  • Newsletter
  • Journals
  • About
    • Authors
    • Contact
    • Who we are
    • Partners
    • Submit
  • Expert Career Profiles

covid-19

covid-19 

A Heightened Risk of Digital Exposure: The Cyber Long Tail of Covid

December 6, 2021December 6, 2021 Ian Jennings 565 Views 0 Comments covid-19, expert, expert. opinion 5 min read

Life is beginning to return to some kind of normal for many of us. But for IT and cybersecurity teams

Read more
General 

Collaboration as a Threat vector

October 12, 2020October 12, 2020 Tom Madsen 860 Views 0 Comments covid-19, expert, Opinion, risk 6 min read

The use of collaboration platforms has spiked this year, helping to ease the effects of the Corona crisis. However, these platforms are a security threat themselve. Read why and what do about it in this article.

Read more
General 

Home Office: securing the new remote work

August 24, 2020August 24, 2020 Thomas Ehrlich 2028 Views 1 Comment covid-19, Opinion, sase, zerotrust 3 min read

Due to the ongoing crisis, Work-from-Home has finally gone mainstream. However, just using VPN is not enough to secure remote access – the new SASE concept might just be the solution companies need, writes our guest author Thomas Ehrlich.

Read more
covid-19 

Special: Covid-19 and Cybersecurity Update

August 10, 2020August 10, 2020 Editor's Desk 1135 Viewscovid-19 3 min read

Special: How Corona changed Cybersecurity. A couple of new articles about covid-19 along with our posts related to the crisis from the past months.

Read more
covid-19 

Enforcing Security Best Practices During COVID

August 10, 2020August 10, 2020 Adam Glick 850 Views 0 Comments covid-19 5 min read

If you are responsible for IT security, much of what you knew about keeping data safe and systems secure went

Read more
General 

Viruses: Biological versus Computer

July 3, 2020June 23, 2020 Mark Webb-Johnson 913 Views 0 Comments covid-19, Opinion 5 min read

These days, everybody talks about Covid-19 and cyberattacks. But how do biological and computer viruses compare? Read all about it here

Read more
General 

Video: Theresa Payton on APT attacks on healthcare

May 19, 2020May 19, 2020 Editor's Desk 1267 Views 0 Comments apt, covid-19, expert, Interview, video 0 min read

We had the chance to talk to Theresa Payton, Former White House Chief Information Officer and CEO of Fortalice Solutions about the recent attacks on healthcare organisations.

Read more
General 

Practicing the Art of Cyber Distancing

May 13, 2020May 13, 2020 Tim Bandos 1079 Views 0 Comments covid-19, expert 6 min read

How can you secure your work setting when working from home? Find out in this article about the art of cyber distancing.

Read more
General 

The Cyber threats of returning to work

May 4, 2020April 30, 2020 Editor's Desk 13372 Views 0 Comments covid-19, expert, Opinion 3 min read

There are many threats which are increasing now that everyone is working from home – but will there be additional threats once we return to the office? Find out in our latest article

Read more
General 

In a changing networking environment, (zero) trust is key

May 1, 2020April 30, 2020 Glenn Akester 1149 Views 0 Comments covid-19, expert, network, zerotrust 6 min read

Zero Trust is a concept known for a decade – and becomes increasingly important in today’s environment. What Zero Trust entails and why it is even more important today is explained by Glenn Akester in this article.

Read more
  • ← Previous

Latest Podcast

CSM Podcast: Trusted Data Intermediaries
In our latest podcast, we talk to James Robson, from The Evidence Quarter, to talk about Trusted Data Intermediaries.

Find all podcasts here

Media Partnerships

National Cyber Security Show 2023

25-27 April 2023

Cybersecurity News

Newsletter

To subscribe to our newsletter, simply fill out the form below.

Read our archived Newsletter here.

  • About Cybersecurity Magazine
  • Newsletter
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy
Copyright © 2023 Cybersecurity Magazine.
All rights reserved.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT