NIS2 is an EU framework designed to provide “legal measures to boost the overall level of cybersecurity in the EU.” More specifically, it focuses on cybersecurity preparedness, crisis management and cooperation across member states as part of a harmonised “culture of security”.
When it comes to election security, the technology we use to vote and count those votes is not the problem. The problem is how naive…
As legislatures around the world try to get a handle on the growth of ransomware, another category of cybercrime is festering out of control: Elder…
Richard Starnes, CISO at Six Degrees, discusses the increasingly pivotal role of today’s CISOs and why, in the face of growing danger from an ever-expanding…
Identity security is one of the most significant issues facing individuals and businesses. Phishing and identity theft dwarfs ransomware in...more
Finding content from legacy media is getting difficult in social media by design of the management of social media companies, while information from radicalized groups,…
In the ever-evolving landscape of technology, each year brings a new set of cybersecurity threats that can put your digital life and sensitive information at…
The need for knowledgeable people to safeguard our online environment has increased. In this context, women have become significant influences in cybersecurity.
In the last year the tech world has seen some spectacular expectation resets on “revolutionary” technology. Social media has gonemore
“Sextortion” is a popular theme in media and the news, but it may or may not be a big deal. It might not even be…
Read our archived Newsletters here.
Everybody is going to own their own data. I'm going to own my own data. You going to own your own data. Your mother, your…
The goal of these companies is to make the job of protecting user data easier for the user
No model if you stop at one and two is of any value unless it can sort out whether the information sources that it's actually…
TikTok is like a Dickens novel. It’s the best of apps. It’s the worst of apps. There seems to be no in-between. Over the next…
The cybersecurity industry seems addicted to research but isn’t all that good at it. Mining the massive amount of data produced is daunting but crucial to everyone. Surveys and studies are an important part of marketing form the cybersecurity industry.…
Our current election season faces the same problems as in 2016 and 2020. Foreign adversaries are interfering with the election process. This time we know…
That doesn’t mean you shouldn’t buy those whizbang, nifty gifts this weekend, you just need to go into it knowing what you are unleashing upon…
While we all crave relaxed summer getaways, it’s crucial to understand that adversaries never go on vacation. Unlike in schoolsmore
When they discuss issues in meetings, we all agree on a passphrase for whatever decision maker is chosen. It’s not shared in emails, texts, or…
The wave of DDoS attacks that flood the Internet daily made everyone aware of the relevance of tDDoS attacks. The question is how to properly…
Today is Safer Internet Day and we thought we'd try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is…
Ever heard of Franken-phish? It's a campaign that targets Microsoft 365 users. It sells kits comprised of components of other kits readily available on the…
The recent ransomware attacks on critical infrastructure services could not have demonstrated more clearly how interwoven the IT environment is with the control of production…
Smishing is the latest and growing version of phishing. In this case, it is using text messaging platforms to gather passwords and identities and deliver…
elf-righteous, but they are imaginative in looking for new ways to rip you off. That's why we are launching this special series, Scam Bucket ,…
Cyber Protection Magazine is proud to introduce a new series of articles explaining fancy terms of cybersecurity. We will keep them short, to the point…
Since the introduction of cloud computing it has been touted as a “more secure” option than local servers. As the number of data breaches in…
Our chief editor Lou Covey participated in the Cyber News Show for Infosec.live today with host Simon Linstead giving an...more
We are at an inflection point in the US Congress. For decades technology companies have been given free rein to advance and innovate without concern for the negative impact of what they produce. That honeymoon seems to be over, but their lobbying power has kept the weight of regulation relatively…
The cybersecurity industry is just absolute chaos, and rightly so. This is the industry charged with plugging dikes during the Class-5 hurricane that the internet seems to be today. Nowhere is that chaos more evident than at RSAC just from a marketing perspective. Everyone has “ground-breaking”, “industry-leading”, and “first ever”…
There are many themes arising for the RSA Conference next week including tools and services to protect against originating with unsecured third parties in the supply chain. That is a crucial issue in every industry especially with almost every company doing business with a supplier in the cloud. But the…
You can do everything right, but credit card fraud is inevitable. In recent weeks, Cyber Protection Magazine has fielded calls and emails from people who have followed all the best-known techniques for securing banking, debit, and credit card information. That includes bank notifications every time the card is used, multi-factor…
The healthcare industry is a vulnerable target of cybercriminals, but not for the reasons most business sectors are. Between 80 and 90 percent of all cybercrime results from people not following basic cyber hygiene practices, but in healthcare criminals gain access to information through infrastructure weaknesses and the murky third-party…
“Brushing” scams are one of the rarer internet crimes and are hard to defend once started. They can range from relatively benign pranks to outright identity theft. Most commonly found on Amazon, they can occur on any e-commerce site that uses customer reviews to boost products.
Generative AI platforms have dominated news cycles for much of 2023 and that probably won’t abate in 2024. That isn’t surprising. The technology is spreading through every facet of life. Our lead article from the 2024 predictions issue!
Frontline documentary on Facebook
Ever heard of Paxful Wallet? If you’re one of the 3 million people who use it to buy, sell, and store cryptocurrency that answer is yes. Since that customer base represents less than one percent of the US population, probably not. Unless that is, you are one of the thousands…