Cyber Protection for the rest of us
Secure your business with Lupasafe and Cyber Protection Magazine
Secure your business with Lupasafe and Cyber Protection Magazine
Note: Cyber Protection Magazine rarely writes about individual products unless we cannot find similar products to compare. In this case,more
The rapid and continuous advances in information technology are among the greatest drivers of contemporary business. However, as with any technological progress, organizations must remain…
The DDoS attack on X.com this week provided a certain amount of schadenfreude for people less than enamored by Elon Musk. It also rang alarm…
Space systems have become an indispensable component of modern infrastructure, supporting global communications, navigation, defense, and scientific exploration. Cybersecurity, once an afterthought in space mission…
For this year's International Women's Day, considering what's going on in the world, it’s more important than ever to reflect on gender equality in the…
Pig-butchering may be proving the Luddites were right. The social-engineering scam bypassed ransomware as the most profitable cybercrime approximately two years ago. After government regulations…
It seems like the insurance industry is turning the corner on cyber insurance and making a decent profit in the process. But not every industry…
Finding content from legacy media is getting difficult in social media by design of the management of social media companies, while information from radicalized groups,…
In the ever-evolving landscape of technology, each year brings a new set of cybersecurity threats that can put your digital life and sensitive information at…
The need for knowledgeable people to safeguard our online environment has increased. In this context, women have become significant influences in cybersecurity.
Read our archived Newsletters here.
Everybody is going to own their own data. I'm going to own my own data. You going to own your own data. Your mother, your…
The goal of these companies is to make the job of protecting user data easier for the user
No model if you stop at one and two is of any value unless it can sort out whether the information sources that it's actually…
TikTok is like a Dickens novel. It’s the best of apps. It’s the worst of apps. There seems to be no in-between. Over the next…
Encryption became a hot topic in the news in the past month. The United Kingdom, Sweden, France and the EU are considering requiring “back doors” to encryption protections. The “Signalgate” scandal in Washington, DC started most people asking, “What is…
On Mastodon a poster asked last week, “Looking for an article or blog or text, that succinctly describes, at grade 1 level English, why ‘if…
As legislatures around the world try to get a handle on the growth of ransomware, another category of cybercrime is festering out of control: Elder…
The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM). Identity…
Our current election season faces the same problems as in 2016 and 2020. Foreign adversaries are interfering with the election process. This time we know…
That doesn’t mean you shouldn’t buy those whizbang, nifty gifts this weekend, you just need to go into it knowing what you are unleashing upon…
While we all crave relaxed summer getaways, it’s crucial to understand that adversaries never go on vacation. Unlike in schoolsmore
When they discuss issues in meetings, we all agree on a passphrase for whatever decision maker is chosen. It’s not shared in emails, texts, or…
The wave of DDoS attacks that flood the Internet daily made everyone aware of the relevance of tDDoS attacks. The question is how to properly…
Today is Safer Internet Day and we thought we'd try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is…
Ever heard of Franken-phish? It's a campaign that targets Microsoft 365 users. It sells kits comprised of components of other kits readily available on the…
The recent ransomware attacks on critical infrastructure services could not have demonstrated more clearly how interwoven the IT environment is with the control of production…
Smishing is the latest and growing version of phishing. In this case, it is using text messaging platforms to gather passwords and identities and deliver…
Dealing with wonky printers is a universal frustration. According to Gartner studies, printers are by far the biggest technology problem, racking up 50 percent of all technical support calls worldwide. And that makes them a very profitable scam. Here’s how it works. You’re sitting at home and want to print…
Phishing attacks are on the rise again with the help of sophisticated generative-AI tools. However, new defenses and increased wariness among potential victims are blunting phishing's potential for widespread harm.
The EU's Digital Operational Resiliency Act (DORA) went live in January. This legislation's goals seem to conflict with the US administration’s willingness to ignore technology security standards. The question is: Who will stand up to protect corporate and consumer data? DORA is highly targeted at the stability and resilience of…
There has been a lot of debate regarding the imposition of moderation on social media and whether that constitutes censorship and violations of the right to free speech. That argument is specious at best. Offending content on commercial social media is removed only when it negates profitability. Most humans moderate…
There is no question that the cybersecurity industry performs a vital role in keeping the digital world safe. It’s too bad the industry is so dedicated to bland, repetitive and un-informational marketing and research. The problem doesn’t exist with cybersecurity alone. Every tech industry under finances and plagiarizes marketing communications…
Mark Zuckerberg made two announcements about major changes in Meta in the past two weeks. The first was the revelation that they would be creating hundreds of AI-driven bots to interact with users. The second was the announcement that they would stop moderation of content, “except for dangerous stuff,” according…
We open a new year and a new season with our friend, Ian Thornton-Trump, chief information security officer at the MSSP Inversion6 and in 30 minutes we take on some pretty meaty subjects. First, we discuss how China strategically infiltrated technology systems in the US and other countries as a…
The AI industry supposedly to make life easier for humanity. Since it first burst onto the scene it has, arguably, made life more difficult. Consumers and the cybersecurity industry, in particular, are struggling professionally, emotionally, and mentally to understand the value, if not the efficacy, of the technology. Cyber Protection…
Just when you thought the political fundraising texts were done, you get this screamer on your phone… Now that readsmore
It is Medicare scam season when Medicare patients can change their insurance plan for the new year, and that means...more