The digital world is changing fast, and now AI agents are appearing as non-human users who act autonomously. They log in to systems, handle transactions, review data, and even negotiate or create things without people having to step in every time. This shift means greater overall demand for software and changes how work is done. However, this should prompt you to consider online trust and security.
Ransomware has evolved; attackers now hunt for backup systems before launching the main strike. They slip into an environment, corrupt the recovery chain, then trigger…
Subdomain takeover is one of those vulnerabilities that refuses to die. Every few years it gets rediscovered, scanners add more signatures, and reports get louder,…
California this year launched an online site to put teeth into the 2023 California Delete Act. It could be the most powerful privacy tool consumers…
The rapid evolution of AI has inaugurated a new era of productivity and efficiency across industries. From autonomous workflows thatmore
The AI industry appears to be reaching a crossroads that will determine its future in the next two years. The only clear outcome is it…
Attackers increasingly rely on AI to influence behavior in real time. Cyber defense systems are now turning to personalized, trustworthy AI platforms to reduce human-driven…
Pig-butchering may be proving the Luddites were right. The social-engineering scam bypassed ransomware as the most profitable cybercrime approximately two years ago. After government regulations…
It seems like the insurance industry is turning the corner on cyber insurance and making a decent profit in the process. But not every industry…
Finding content from legacy media is getting difficult in social media by design of the management of social media companies, while information from radicalized groups,…
In the ever-evolving landscape of technology, each year brings a new set of cybersecurity threats that can put your digital life and sensitive information at…
The need for knowledgeable people to safeguard our online environment has increased. In this context, women have become significant influences in cybersecurity.
Read our archived Newsletters here.
Everybody is going to own their own data. I'm going to own my own data. You going to own your own data. Your mother, your…
The goal of these companies is to make the job of protecting user data easier for the user
No model if you stop at one and two is of any value unless it can sort out whether the information sources that it's actually…
TikTok is like a Dickens novel. It’s the best of apps. It’s the worst of apps. There seems to be no in-between. Over the next…
Cloud-native application protection platforms (CNAPP) emerged as an industry niche around 2021, when Gartner coined the term to describe to consolidate cloud‑security capabilities under a single term. The niche evolved as organizations adopted cloud-native technologies and needed integrated security solutions.…
You’ve done this many times. Checking your email you find a ton of spam, especially from this one organization or person. You are finally tired…
n the past few weeks, as various security companies have published multiple studies about the state of cybersecurity, a common theme has arisen: Executives running…
On Mastodon a poster asked last week, “Looking for an article or blog or text, that succinctly describes, at grade 1 level English, why ‘if…
As legislatures around the world try to get a handle on the growth of ransomware, another category of cybercrime is festering out of control: Elder…
The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM). Identity…
Our current election season faces the same problems as in 2016 and 2020. Foreign adversaries are interfering with the election process. This time we know…
That doesn’t mean you shouldn’t buy those whizbang, nifty gifts this weekend, you just need to go into it knowing what you are unleashing upon…
While we all crave relaxed summer getaways, it’s crucial to understand that adversaries never go on vacation. Unlike in schoolsmore
When they discuss issues in meetings, we all agree on a passphrase for whatever decision maker is chosen. It’s not shared in emails, texts, or…
The wave of DDoS attacks that flood the Internet daily made everyone aware of the relevance of tDDoS attacks. The question is how to properly…
Today is Safer Internet Day and we thought we'd try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is…
Ever heard of Franken-phish? It's a campaign that targets Microsoft 365 users. It sells kits comprised of components of other kits readily available on the…
Vibe coding (using LLMs to create computer code) was all the rage when 2025 began. By June, the bloom had fallen off the rose. Companies offering platforms and tools for the practice saw dramatic downturns in users. What happened? Evidence points to the traditional market practice of targeting early tech…
The Cybersecurity Information Sharing Act (CISA) of 2015 expired January 30, 2026. Whether that means anything is debatable. The 10-year old act facilitates sharing cyber threat information between the government and private sector organizations. Many security experts are unimpressed by how the act performed. Chaim Mazal, Chief AI and Security…
The Superbowl is a few days away, the Winter Olympics starts in February and the Summer Olympics is not far...more
As the world stumbles head on into deglobalization we predict national sovereign clouds will replace international access to data. That is good news for in-country corporations and for security companies in specific fields. It may not be so good for large multinational tech firms and people living in authoritarian countries.…
It’s that time of year when the weather turns cold, shoppers obsess over gift ideas, and tech companies start pounding the inbox with predictions for the next year. But for Cyber Protection Magazine we collect them all through December and compile them in January. Today we will look back and…
Happy Holidays - our last issue of the year is out, and it's all about Disinformation or, as we like to put it: Dysinformation. Dysinformation is a scourge of society, fueled by social media and malicious actors, but you may not have heard the term spelled this way. Dysinformation simply…
There has been a debate within the cybersecurity industry regarding cyber training effectiveness. On one side are tool providers who claim technology trumps training in securing data, networks, and people. On the other side is the $10-billion cyber training industry, growing at 20 percent per year. That says they must…
Proxies are absolutely crucial to the operation of the internet, but they also represent a clear and present danger to users. Finding that balance is pretty much a full-time job for cybersecurity. The recent Amazon Web Services (AWS) and Microsoft Azure outages are good examples of that. Amazon explained the…
Technology journalism, like the rest of journalism,has struggled for most of the 21st century. The advent of AI generated content his restoring the value of professional journalists. It is crucial not just to democracies but to business success. One of the most prolific and successful technology journalists is Bolaji Ojo.…
AUSTIN, Texas — October 20, 2025 — Living Security today previewed its forthcoming, AI-native Human Risk Management (HRM) platform –more
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Or check out our membership levels for full access here
