Last updated on May 27th, 2022 at 03:36 pm


Affordable training in abundance

The lack of security professionals isn’t because of a lack of affordable training


World Productivity Day: Efficiency in the Technological Age

It’s World Productivity Day, and Cyber Protection Magazine spoke to nine technology experts to get their tips on how to motivate and get the most out of their workforce and help to increase productivity in the cybersecurity industry.


Promoting Cybersecurity for Accountants

Often, the weakest link in cybersecurity is considered to be people, as 85% of successful cyberattacks involve some form of human element. Employees in accounting are highly vulnerable to these breaches.

RSAC2022 North Hall

Is your freelancer a nation-state hacker?

The Biden administration warned in May that the freelancer you hired to code may be a North Korean spy. These cyber spies are posing as remote, contract IT workers and infiltrating malware into all forms of networks


Ransomware: The Worst is Yet to Come

Even though ransomware attacks declined for the first half of this year, the worst is yet to come, experts say.


Cyber Protection Magazine: Cloud Expo Issue

Our first printed special edition of Cyber Protection Magazine is here. This time the issue is not only available in digital form, a printed version is also available on the Cloud Expo Europe in Frankfurt. Consequently, we have a few topics we discuss in this issue.


Ukraine war is fast-tracking cyber laws

Thanks to Vlad “The Invader” Putin, the EU, UK and US are fast-tracking cyber laws. But some experts think the laws and regulations lack proper incentives beyond fines and prosecution.


Russian Cyber Warfare capabilities overblown

There is one thing we learned from the Ukraine war: the Russian army is not nearly as powerful as we believed it was. That goes for their cyberwarfare capabilities as well – find out why in our latest Crucial Tech podcast.


Ransomware 101: Keeping the lights on when hackers attack

Ransomware attackers are reliant on a business’ inability to recover. In this article, Christopher Rogers from Zerto explains what companies can do to prioritize recovery.


The Role of a Zero Trust Network in Your Organisation’s Digital Transformation

Traditionally, security architectures focused on protecting the network. In a connected world, this approach is no longer effective. A zero trust security architecture is essential for every organisation. 


Focus Social Engineering – building the security mindset

Criminals increasingly turn to the weakest link in the security chain – people. Social Engineering attacks are on the rise. Read about what social engineering is, its most common forms and, of course, how to counter it


The Psychology Behind Cybersecurity

With seemingly no end to the growing problem of cyberattacks in sight, the cybersecurity industry is increasingly looking to address the root of the problem; humans.


GDPR and the Future of Data Regulation

Today marks the 4th anniversary of GDPR. We spoke to eight experts and asked them, what changes the regulation brought.


WannaCry: Ransomware defence, five years on

In 2017 the largest ransomware attack in history – WannaCry – swept across the globe, infecting a quarter million machines in more than 150 countries. What lessons can be drawn from the attack, and how can businesses keep their systems secure?

Colonial Pipeline: One year on from the ransomware attack that shocked the world

One year ago Colonial Pipeline – the largest fuel pipeline in the US – suffered a ransomware attack. Cyber Protection Magazine speaks to three cybersecurity experts to learn what organisations can still do to prevent themselves from becoming the next victim.

Arqit Suit Pulls Back the Curtain on Quantum

The Arqit shareholder fraud lawsuit is pulling back the curtain on the Quantum computing industry. Before it’s over we may see how much is FUD, snake oil and legitimate.

You Can’t Stop Cyberattacks on your Organization!

Cyberattacks have become so prominent in the industry that organizations are now realising the need to have special task forces to stop such occurrences. But the truth is they are inevitable.

Blazing a Trail to Zero Trust

Cybersecurity is a mystery to most people and organizations and the industry isn’t very helpful in clearing that up. Zero Trust (ZT) is a good first step but it, too, is a black hole of confusing information. But there are some individuals that are blazing a trail to ZT.

Password, qwerty, 123456: Leaving bad habits behind on World Password Day

It’s World Password Day. If you’re still using weak passwords or one password for all your online services – read this article to hear what some experts say and what you need to change now.

1 2 39