Cybersecurity and data privacy are not the same thing
Cybersecurity and data privacy are two parts of a whole discipline, but they are not the same thing. From corporate and individual perspectives it’s worth

Data Protection Day 2023: A Priority Not An Option
Data Protection Day serves as a stark reminder to companies to review their data security systems and look for ways to evolve, become more resilient, and, ultimately, build trusting relationships with their customers.

Supply Chain Cybersecurity Will Be a Leading Concern in 2023
Supply chains across industries continue to face challenges as we enter 2023, The sector has already been crippled and it has little room for additional burdens.

How Google enhances API security in the cloud
Ensuring API security is essential for ensuring cybersecurity – especially in the cloud. We had the chance to interview Bernd Wagner, Managing Director Google Cloud Germany, about their API security offering.

Putting proactive API security first
Cyberattacks are becoming more frequent and more harmful, particularly when it comes to APIs. However, with the right knowledge and tools, organisations can be in a good position to defeat them before they happen.
Features

Demystifying Quantum Cryptography
The NIST announcements about 4 algorithm standards to protect against quantum computing hacks had marketing departments go into overdrive. We decided it’s time to start demystifying quantum cryptography.

The Security Standard to rule them all
Taken from our latest special issue, Alex Leadbeater, ETSI’s Chair of Cybersecurity discusses their IoT-Security standard

Ransomware: The Worst is Yet to Come
Even though ransomware attacks declined for the first half of this year, the worst is yet to come, experts say.

Cyber Protection Magazine: Cloud Expo Issue
Our first printed special edition of Cyber Protection Magazine is here. This time the issue is not only available in digital form, a printed version is also available on the Cloud Expo Europe in Frankfurt. Consequently, we have a few topics we discuss in this issue.

Ukraine war is fast-tracking cyber laws
Thanks to Vlad “The Invader” Putin, the EU, UK and US are fast-tracking cyber laws. But some experts think the laws and regulations lack proper incentives beyond fines and prosecution.
Company Blogs
Secure Your API
Validate your OAS (Open API Specification) by simply uploading your Swagger file below.
OpenAPI/Swagger Scanner
Know-How
Newsletter
Read our archived Newsletters here.
Podcast

Fraud will dominate 2023
It’s that time of year for making predictions for the coming year and the team at Cyber Protection Magazine put out the call in early
Latest Video
Articles

Video Byte: Expert Predictions for 2023 – Part 2
As the year is slowly coming to an end, we’re consulting our crystal ball to see what’s ahead. Well, not exactly our crystal balls, instead we asked experts from around the cybersecurity industry to share their predictions for the upcoming year.

4 Cybersecurity Tips You Should Follow If You Work From Home
Many people continue to work from home despite the reopening of offices after the pandemic subsided. While working from home comes with a dilemma: cybersecurity risks.

Video Byte: Experts Predictions for 2023 – Part 1
Following our article on what we can expect in the world of cybersecurity in 2023, we’ve asked more industry experts to take a look into

Exploring DRM as an Industry Standard Security Addition to File Transfers
With the rise of remote working, sharing sensitive files is now taken for granted. But embracing this collaborative approach comes with increasing concerns regarding the security of our file transfers.

Recession? What recession?
Experts state that we are in the middle of a recession. Well, maybe the ‘real’ world, but not the tech world. And let’s face it, it’s becoming increasingly hard to differentiate between the two.

Computer Security Day: How to tackle ever advancing cyber threats
When Computer Security Day was started in 1988, few could have imagined just how vital cybersecurity would become.
Cyber Protection Magazine spoke to nine industry experts, to learn about the most important cybersecurity practices.

Seven key principles behind a robust cybersecurity practice
Cybersecurity remains a top priority for SMBs worldwide. Which can be good news for technology service providers, as a strong cybersecurity practice can distinguish them from their competition. But how do TSPs improve their cybersecurity offers?

Black Friday – Deals, Hacks and Scams Aplenty
With Black Friday and Cyber Monday fast approaching, this weekend is gearing up to be the biggest e-commerce event of the year. But, with this popularity comes the increased interest of cybercrimminals who seek to take advantage of retail’s busiest time of the year.

Scam Bucket: Beware the ‘Unsubscribe’ button
Spam emails are annoying and most of us just ignore them, but every once in a while some might be willing to look for the

The most important security standard received an update
Cyber-attacks, disrupted supply chains, cloud usage––in an increasingly volatile environment, the demands that must be met by IT security are growing rapidly. One of the leading cybersecurity standards, ISO 27001, has now updated their versions to reflect the dynamics in the cybersecurity industry.

Zero Trust in Practice – Adopting and Sustaining it in Your Real-World Environment
Zero trust is a heavily used buzzword. It inspires confidence when it’s used by cyber security and technology experts to imply a completely secure technology environment that protects people, devices and applications – all of the time.