Data Protection Day 2023: A Priority Not An Option

Data Protection Day serves as a stark reminder to companies to review their data security systems and look for ways to evolve, become more resilient, and, ultimately, build trusting relationships with their customers.

 

Supply Chain Cybersecurity Will Be a Leading Concern in 2023

Supply chains across industries continue to face challenges as we enter 2023, The sector has already been crippled and it has little room for additional burdens.

  

How Google enhances API security in the cloud

Ensuring API security is essential for ensuring cybersecurity – especially in the cloud. We had the chance to interview Bernd Wagner, Managing Director Google Cloud Germany, about their API security offering.

 

Putting proactive API security first

Cyberattacks are becoming more frequent and more harmful, particularly when it comes to APIs. However, with the right knowledge and tools, organisations can be in a good position to defeat them before they happen.

The NIST cryptography standards process
   

Demystifying Quantum Cryptography

The NIST announcements about 4 algorithm standards to protect against quantum computing hacks had marketing departments go into overdrive. We decided it’s time to start demystifying quantum cryptography.

   

The Security Standard to rule them all

Taken from our latest special issue, Alex Leadbeater, ETSI’s Chair of Cybersecurity discusses their IoT-Security standard

  

Ransomware: The Worst is Yet to Come

Even though ransomware attacks declined for the first half of this year, the worst is yet to come, experts say.

  

Cyber Protection Magazine: Cloud Expo Issue

Our first printed special edition of Cyber Protection Magazine is here. This time the issue is not only available in digital form, a printed version is also available on the Cloud Expo Europe in Frankfurt. Consequently, we have a few topics we discuss in this issue.

  

Ukraine war is fast-tracking cyber laws

Thanks to Vlad “The Invader” Putin, the EU, UK and US are fast-tracking cyber laws. But some experts think the laws and regulations lack proper incentives beyond fines and prosecution.

Validate your OAS (Open API Specification) by simply uploading your Swagger file below.

OpenAPI/Swagger Scanner

+ Drag & Dropupto 4MBOr view sample
Talk with us about API Security
 

Video Byte: Expert Predictions for 2023 – Part 2

As the year is slowly coming to an end, we’re consulting our crystal ball to see what’s ahead. Well, not exactly our crystal balls, instead we asked experts from around the cybersecurity industry to share their predictions for the upcoming year.

 

4 Cybersecurity Tips You Should Follow If You Work From Home

Many people continue to work from home despite the reopening of offices after the pandemic subsided. While working from home comes with a dilemma: cybersecurity risks.

 

Video Byte: Experts Predictions for 2023 – Part 1

Following our article on what we can expect in the world of cybersecurity in 2023, we’ve asked more industry experts to take a look into

 

Exploring DRM as an Industry Standard Security Addition to File Transfers

With the rise of remote working, sharing sensitive files is now taken for granted. But embracing this collaborative approach comes with increasing concerns regarding the security of our file transfers.

 

Recession? What recession?

Experts state that we are in the middle of a recession. Well, maybe the ‘real’ world, but not the tech world. And let’s face it, it’s becoming increasingly hard to differentiate between the two.

 

Computer Security Day: How to tackle ever advancing cyber threats

When Computer Security Day was started in 1988, few could have imagined just how vital cybersecurity would become.
Cyber Protection Magazine spoke to nine industry experts, to learn about the most important cybersecurity practices.

Seven key principles behind a robust cybersecurity practice

Cybersecurity remains a top priority for SMBs worldwide. Which can be good news for technology service providers, as a strong cybersecurity practice can distinguish them from their competition. But how do TSPs improve their cybersecurity offers?

Black Friday – Deals, Hacks and Scams Aplenty

With Black Friday and Cyber Monday fast approaching, this weekend is gearing up to be the biggest e-commerce event of the year. But, with this popularity comes the increased interest of cybercrimminals who seek to take advantage of retail’s busiest time of the year.

When the email address is wrong

Scam Bucket: Beware the ‘Unsubscribe’ button

Spam emails are annoying and most of us just ignore them, but every once in a while some might be willing to look for the

The most important security standard received an update

Cyber-attacks, disrupted supply chains, cloud usage––in an increasingly volatile environment, the demands that must be met by IT security are growing rapidly. One of the leading cybersecurity standards, ISO 27001, has now updated their versions to reflect the dynamics in the cybersecurity industry.  

Zero Trust in Practice – Adopting and Sustaining it in Your Real-World Environment

Zero trust is a heavily used buzzword. It inspires confidence when it’s used by cyber security and technology experts to imply a completely secure technology environment that protects people, devices and applications – all of the time.