In the immortal words of Ferris Buller, “life moves pretty fast.” So does Cybersecurity. A recently published guide from OCEG will help you navigate this landscape.
There is a growing concern that the increasing use of AI could create a tipping point where the technology grows and permeates our personal lives and businesses rapidly, building upon itself while cyber protections are still catching up.
With the rise in popularity of cryptocurrencies, there has also been an alarming increase in cryptocurrency scams that target unsuspecting investors.
A relatively new “smishing” attack (using SMS texts to gather personal information) is moving through the US, with the attackers posing as the United States
Fake news is a more significant threat to cybersecurity than most people realize, therefore it’s essential to be aware of how one can certify a news story’s validity online.
The need for knowledgeable people to safeguard our online environment has increased. In this context, women have become significant influences in cybersecurity.
In the last year the tech world has seen some spectacular expectation resets on “revolutionary” technology. Social media has gone from a boon to democracy
“Sextortion” is a popular theme in media and the news, but it may or may not be a big deal. It might not even be a crime depending on where you live. No one can really come up with a consensus about what it is and how widespread it is. It’s even difficult to pin down what constitutes the typical perpetrator of this crime.
Generative AI is generating press describing it as a blessing or a curse, perhaps both. Cooler heads, however, are finding balance and benefit, especially in the cybersecurity field.
“We are seeing some phishing attempts offering loans, or pretending to be founders to financial teams,” said Grant Warnick, CEO of cybersecurity company Fletch. “We are expecting more fraud attempts this week as bad actors pretend to be companies impacted by this incident.”
Read our archived Newsletters here.
Rohit Ghai, CEO of RSA Security
Today marks International Women in Cyber Day. Cyber Protection Magazine collected commentaries from women around the cybersecurity industry.
If you look around your house or office, you’ll be surprised which of your devices are the most risky. Spoiler: It’s not your computer.
The cybersecurity market is heading for a reckoning without serious adjustments to marketing strategies. Recent reports, including one from Dimensional Research, showed large enterprises are
A new report shows the growing threat of unwanted voice traffic and its pervasive impact on enterprises worldwide.
The shortage in cybersecurity experts has led businesses to compete in earnest over a small pool of talent and the consequences of this are that more cybersecurity professionals are changing jobs than ever.
The arena of Zero Trust is an unbridled circus. Conflicting best practices, classic overselling, and niche use cases abound making two things painfully clear: 1) organizational leadership is making Zero Trust a top priority, and 2) the folks tasked with implementing it have no idea where to start.
When companies consider the value of cybersecurity awareness training, they should be thinking about their cybersecurity responsibilities in an even more fundamental and comprehensive way.
As with any digital product, security relies on four arenas. User responsibility, corporate accountability, government regulation and industry standards.
We have partnered with it-sa365, a printed issue of Cyber Protection Magazine will be distributed there. And you can be part of it!
Ransomware attacks have cost victims millions upon millions of dollars, and these attacks are increasing at an alarming rate. This article will explore effective strategies to prevent and recover from these ambushes.
One of the most famous – or infamous – hackers of all time, Kevin Mitnick, passed on July 16th.
While early in his career he was definitely leaning towards the dark side, he later did more for raising awareness to cybersecurity threats than most people.
Are you enjoying our independent forum for news and commentary in cybersecurity?
Support us!