A few weeks ago a SeekingAlpha post predicted, “Here come the layoffs”. Cybersecurity seems to be bucking the trend, however, thanks to a combination of
Last updated on September 6th, 2022 at 07:37 am
Ransomware continues to be one of the biggest cybersecurity threats. It may be worth taking up insurance as part of one’s defensive strategy.
Quantum computing is often in the news, mostly about how it’s going to destroy the world as nation-states bust the hardest encryptions around so they
Business Email Compromise (BEC) is a serious threat, and it often goes unnoticed. Read here what you can do about hackers impersonating your CEO or CFO in our latest guest Article from Alejandro del Hoyo.
Bruce Schneier has an opinon on blockchain
The NIST announcements about 4 algorithm standards to protect against quantum computing hacks had marketing departments go into overdrive. We decided it’s time to start demystifying quantum cryptography.
Taken from our latest special issue, Alex Leadbeater, ETSI’s Chair of Cybersecurity discusses their IoT-Security standard
Even though ransomware attacks declined for the first half of this year, the worst is yet to come, experts say.
Our first printed special edition of Cyber Protection Magazine is here. This time the issue is not only available in digital form, a printed version is also available on the Cloud Expo Europe in Frankfurt. Consequently, we have a few topics we discuss in this issue.
Thanks to Vlad “The Invader” Putin, the EU, UK and US are fast-tracking cyber laws. But some experts think the laws and regulations lack proper incentives beyond fines and prosecution.
Due to the cybersecurity talent shortage, many organizations have decided to engage with security service providers to help protect critical assets and ensure round-the-clock detection and response to threats.
It’s not a surprise that cyber criminals have identified APIs as one of the most lucrative targets when it comes to retrieving sensitive information. Here are some ideas how to prevent API attacks.
The responsibility for software security has shifted “to the left,” placing increased expectation on developers for the security of cloud native applications. Open Source to the rescue!
The recent US Supreme Court decision on abortion didn’t just set back women’s rights by half a century. It also restored the rhythm method of
In honor of Women’s Equality around the world, we are thrilled to put a spotlight on the amazing story of Imevet Checol
Women’s Equality Day has become a marker for how far gender equality has come over the last century. We’ve asked industry expert to reflect on the past, present and future of women in cyber.
Hacker showed how to hack John Deer automated equipment
There are two kinds of cloud security, and both can be explained using the analogy of a medieval city or village. Let’s do the time warp (again).
Keeping the best talent will always be an uphill battle. From trying to entice teachers to forgo higher pay to motivating well-paid employees to achieve more and elevate the corporate vision, nearly endless factors shape the equation of: will they stay or will they go?
Cyber threat intelligence is a vital strategy that prevents attacks, and web scraping is critical to its success.
Last month, it was reported that Roblox – an online game creation platform – had suffered a data breach after one of its employees fell