Skip to content
Cyber Protection Magazine

Cyber Protection Magazine

The online magazine for cybersecurity and data protection

  • Topics
    • Expert Opinions
    • Interviews
    • Security Basics
  • Newsletter
  • Podcasts
  • About
    • Authors
    • Contact
    • Who we are
    • Partners
    • Submit
You are here:Home
Here is how hackers attacked the Oldsmar water supply – and how a catastrophe was prevented
General 

Here is how hackers attacked the Oldsmar water supply – and how a catastrophe was prevented

March 1, 2021March 1, 2021 Editors Desk 0
Beyond the padlock: Why it is crucial to protect your website – and Five tips for doing so
General 

Beyond the padlock: Why it is crucial to protect your website – and Five tips for doing so

February 27, 2021March 1, 2021 Editors Desk 0
The Talent Shortage Crisis in Cyber Security and How to Overcome It
General 

The Talent Shortage Crisis in Cyber Security and How to Overcome It

February 26, 2021February 23, 2021 Matt Donato 0
Interview with Nathan Howe on SASE
General 

Interview with Nathan Howe on SASE

February 21, 2021February 20, 2021 Editors Desk and 1 more 0
SASE: Five steps for a successful transition to modern-day security
General 

SASE: Five steps for a successful transition to modern-day security

February 21, 2021February 20, 2021 Nathan Howe 0

Latest Articles

A picture of your passport sells for $1500 in the dark net
General 

A picture of your passport sells for $1500 in the dark net

February 18, 2021February 18, 2021 Editors Desk 0

Not a week goes by without another eye-catching cyber attack or data leak. But what happens with that data? Find out how (and for how much) your data is sold in this article.

Welcome to Cyber Protection Magazine
General 

Welcome to Cyber Protection Magazine

February 16, 2021February 16, 2021 Editors Desk 0

The cyber security industry evolves at neck breaking speed. What is missing is a publication that keeps track of and explains the issues and evaluates the technology in terms the C-suite and business leaders can understand. This is Cyber Protection Magazine.

California grant program is a security nightmare
General 

California grant program is a security nightmare

February 12, 2021February 15, 2021 Lou Covey 0

Government’s inability to protect citizen data resulted in at least $36 billion in cyber fraud this year. California may be getting ready to add to that total and setting up small businesses to be hit hard by hackers.

General 

Podcast: The hackers won’t let you go. Time to go after them

January 13, 2021January 14, 2021 Lou Covey and 1 more 1

In cooperation with our correspondent from SIlicon Valley, Lou Covey, Cybersecurity Magazine is pleased to now offer podcasts. In this episode, John Flory III, CISO for Harbor Networks, explains why it is necessary to go on offense with ransomware attacks.

Patience and persistence trump technology in SolarWinds attack
General 

Patience and persistence trump technology in SolarWinds attack

January 4, 2021January 4, 2021 Lou Covey 0
A christmas goodie: „Het Virus“ by Eddy Willems
General 

A christmas goodie: „Het Virus“ by Eddy Willems

December 24, 2020December 24, 2020 Patrick Boch 0
COVID19 and US Politics dominated security news in 2020
General 

COVID19 and US Politics dominated security news in 2020

December 11, 2020December 7, 2020 Lou Covey 0
Opinion: Cybersecurity must not be political
General 

Opinion: Cybersecurity must not be political

November 20, 2020November 20, 2020 Patrick Boch 1
Here’s Why You Shouldn’t Overlook Multi-Factor Authentication
General 

Here’s Why You Shouldn’t Overlook Multi-Factor Authentication

May 22, 2020May 22, 2020 Adam Glick 0

Passwords don’t matter. Shortly after world password day, this might come as a shock. Adam Glick from Rocket Software explains why.

5 effective ways to secure your home network
General 

5 effective ways to secure your home network

April 28, 2020February 15, 2021 Patrick Boch 1
The actual impact of Covid-19 on cybersecurity
General 

The actual impact of Covid-19 on cybersecurity

April 7, 2020April 23, 2020 Patrick Boch 0
The real impact of Corona on the cybersecurity industry
General 

The real impact of Corona on the cybersecurity industry

March 13, 2020April 21, 2020 Patrick Boch 0
The state of SAP Security
General 

The state of SAP Security

February 14, 2020February 16, 2020 Patrick Boch 0
2020 – a paradigm change in cybersecurity
General 

2020 – a paradigm change in cybersecurity

December 27, 2019May 1, 2020 Patrick Boch 1

This year saw – again – a painstakingly high amount of attacks, data leaks and cybercrimes. This is especially concerning, as we see the rise

Why SAP Security matters
Enterprise 

Why SAP Security matters

May 2, 2019May 13, 2019 Patrick Boch 0

The growing importance of Cyber Security has become evident recently by the increasing number of media reports of high-profile breaches and data theft. Understandably, the

The real danger of insecure IoT devices
General Internet of Things 

The real danger of insecure IoT devices

April 29, 2019September 6, 2019 Patrick Boch 0

It’s safe to say that the one of the dominating IT-trends over the next years will be the internet of things (IoT). The IoT by

Cyber Protection Magazine

Latest Podcast

California small business grant program is a security nightmare

If you are a small business hoping for a grant from California, listen to this podcast. The state has chosen to work with third-party financial institutions to transfer the funds to banks, but those organizations are asking to violate basic security practices. Moreover, some business banks have internal security mechanisms that prevent the connections between the state and the banks. Find out how to do this safely in this podcast.

Find all podcasts here

Newsletter

To subscribe to our newsletter, simply fill out the form below.

Read our archived Newsletter here.

  • About Cyber Protection Magazine
  • Newsletter
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy


The views and opinions expressed on Cyber Protection Magazine are those of the authors and do not necessarily reflect the official policy or position of Cyber Protection Magazine. Any content provided by our bloggers or authors are of their opinion and are not intended to malign any club, organization, company, individual or anyone or anything.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT