All Articles General Lots of questions for 2025 Lou Covey December 21, 2024December 23, 2024 General Best Practices and Risks Considerations in Automation Editors Desk December 19, 2024December 11, 2024 General How to Implement Least Privilege Principles into Security as Code Dotan Nahum December 17, 2024December 9, 2024 General Online platforms negate tools for shoppers Lou Covey December 13, 2024December 10, 2024 General Cyber Crime Reveals the Need for a Recovery-First Strategy Eric Herzog December 11, 2024December 11, 2024 General Why Zero Trust Should Be at the Heart of Every Organization’s Security Strategy Melis Böke Yazıcıoğlu December 10, 2024December 14, 2024 General Cyber resilience needs action, not words, from world leaders Darren Thomson December 5, 2024November 30, 2024 General Cyberwarfare 2025: The Rise of AI Weapons, Zero-Days, and State-Sponsored Chaos Nadir Izrael December 3, 2024November 30, 2024 General Command & Control: What You Should Know About Password Vulnerability Darren November 28, 2024 General The Importance of DORA, NIS2, and AI for Businesses Elena Sanchez Carvajal, November 22, 2024December 20, 2024 General Three key strategies for organisations to protect themselves from deepfakes Detlev Riecke November 20, 2024November 12, 2024 General The Defender’s Dilemma: Navigating the Evolving Landscape of Threat Detection Christian Borst November 18, 2024November 12, 2024 GeneralScam Bucket Scam Bucket: Political/hate texts and what to do about them Lou Covey November 15, 2024November 15, 2024 General The battle of AI: Only good AI can fight malicious AI Stefan Henke November 14, 2024December 20, 2024 General NIS2 – how SMEs can get to grips with the new requirements for digital supply chain security Andy Fourie November 12, 2024November 12, 2024 Scam BucketSocial Engineering Scam bucket: Medicare scam season Lou Covey November 11, 2024November 11, 2024 General The Hidden Data in Your Images Dakota Murphey November 7, 2024October 28, 2024 General Exploring Vertical Versus Horizontal Cybersecurity Integration David Schiffer November 5, 2024October 28, 2024 General Old Tricks, New Threats: How Social Engineering Drives Cyber Attacks Thomas Caliendo October 31, 2024October 28, 2024 General The Dichotomous Role of AI in Cybersecurity and How To Navigate It Graham Hosking October 29, 2024October 28, 2024 General Encryption? Go FHETCH Lou Covey October 24, 2024October 24, 2024 General How to build ransomware if you can’t code Andy Swift October 24, 2024October 20, 2024 General Awareness Month: Five cybersecurity threats and how to tackle them Marco Eggerling October 24, 2024October 20, 2024 General Cybersecurity Awareness Month: Evolving Threats and Essential Strategies Editors Desk October 22, 2024October 19, 2024 General Don’t Overlook Your Service Providers’ Cybersecurity Capabilities Rachel Banks October 8, 2024October 8, 2024 General Election security worldwide Editors Desk September 30, 2024September 30, 2024 General Telemarketers are hated, but loved by criminals and entrepreneurs Lou Covey September 24, 2024September 24, 2024 General Insurance for Cybersecurity, IT and Technology Professionals Holly Burton September 24, 2024September 20, 2024 Defense against the AI artsGeneralIn the newsLegislation Breach fatigue or too big to fail? Lou Covey September 19, 2024September 18, 2024 General The CISO’s Myopia Jordan Bonagura September 17, 2024October 28, 2024 GeneralKnow-HowPodcastScam BucketSocial Engineering Scam Bucket: Innocence is no replacement for digital vigilance Lou Covey September 12, 2024September 17, 2024 General How Breach and Attack Simulation (BAS) Enhances Robust Cybersecurity Practices Editors Desk September 10, 2024August 29, 2024 GeneralIn the newsLegislation Solons scrambling to save AI Lou Covey September 3, 2024December 20, 2024 General Essential Tips for Securing Your Remote Workspace Editors Desk September 3, 2024August 29, 2024 General Insider Threats: How to Detect and Mitigate Risks from Within Nagaraj Kuppuswamy August 29, 2024August 29, 2024 General Women’s Equality Day: How to ensure women thrive in the workplace Editors Desk August 26, 2024August 23, 2024 General Deepfake DNA & the need for new AI detection tools for rescuing our legal system. Siegfried Lafon August 20, 2024August 29, 2024 GeneralIn the news Security concerns reach beyond CISOs Lou Covey August 14, 2024August 15, 2024 General Media training offered for cyber industry Editors Desk August 13, 2024August 12, 2024 General Addressing Financial Organizations’ Digital Demands while Avoiding Cyber Threats Jon Taylor August 12, 2024August 12, 2024 General Are we too trusting of employees? Jon Fielding August 8, 2024August 7, 2024 Frontpage special ClearSale to Guide Retailers on Winning Retail Gold During Peak Seasons Editors Desk August 6, 2024August 6, 2024 General The Evolution of Ransomware: From Simple Scams to Advanced Cybercrime Strategies Chris Storey August 6, 2024July 31, 2024 General The Importance of Cybersecurity for Small Business Reed Anders July 31, 2024July 31, 2024 General Beyond NIS2 – why regulations should just be the starting point for building better protection Chris Rogers July 25, 2024July 26, 2024 General Cyberattack repercussions: dealing with the people perspective Parisa Bazl July 18, 2024July 26, 2024 General The Crucial Role of Regulatory Frameworks in Ensuring Robust Cyber Security Editors Desk July 16, 2024July 10, 2024 CommentaryGeneralLegislation SEC Cybersecurity Disclosure Rules: Best Practices for Compliance Michael Leach, Forcepoint corporate counsel July 13, 2024July 11, 2024 General Highly Effective AI-Enabled Cybersecurity Requires Massive Amounts of Data David Schiffer July 4, 2024July 2, 2024 General Understanding the role, benefits and limitations of cyber insurance Chris Rogers July 2, 2024July 2, 2024 Defense against the AI artsGeneralIn the newsPredictions Election security is not a technology problem. It is how naive we are Lou Covey June 27, 2024August 29, 2024 cyber hygieneGeneralIn the newsKnow-HowPodcastScam BucketSocial Engineering Elder fraud festers out of control Lou Covey June 21, 2024June 20, 2024 General Why every modern enterprise needs a CISO Richard Starnes June 18, 2024June 19, 2024 General The future of online document signing Szilveszter Szebeni June 13, 2024June 13, 2024 General Reinforcing Multi Factor Authentication James Smith June 11, 2024June 11, 2024 General Talent Acquisition in the Age of Skills Shortage Christian Reimann May 21, 2024May 27, 2024 General Mental Health Awareness Week: Cybersecurity’s Hidden Cost Editors Desk May 18, 2024May 16, 2024 General Securing the building blocks of an interconnected world Patrick Boch May 16, 2024May 21, 2024 General David vs. Goliath: The Challenges Small Businesses Face in Cyber Insurance Martin Hinton May 14, 2024May 15, 2024 General How to stop ransomware in its tracks Editors Desk May 12, 2024May 10, 2024 General How Do You Insure an Unpredictable Risk? Dr. James Norrie May 9, 2024May 7, 2024 General CTEM – useful or just another acronym? Brian Martin May 7, 2024May 21, 2024 cyber hygieneGeneralRSACSocial Engineering Third-party security is almost impossible Lou Covey May 3, 2024May 2, 2024 General Passwordless Instead of Password Security Editors Desk May 2, 2024April 30, 2024 General Ethics in AI should not be an afterthought Scott Allendevaux April 29, 2024December 20, 2024 General Google at loggerheads over support for journalism Lou Covey April 24, 2024April 24, 2024 CommentaryIn the news Commentary: Getting the point of Google News v. the media Lou Covey April 24, 2024September 2, 2024 General The Dynamic Duo – Why Modern Businesses Need the CIO and CISO to Collaborate Javier Dominguez April 23, 2024April 22, 2024 cyber hygieneGeneralKnow-How IAM in a shifting environment Apu Pavithran April 19, 2024April 16, 2024 General Open Season – Why is less data being encrypted than ever before? Jon Fielding April 16, 2024April 16, 2024 cyber hygieneGeneralKnow-HowSocial EngineeringSocial media security A lesson on election security from tea ladies Lou Covey April 9, 2024September 2, 2024 General Why your data isn’t as safe as you think and what it could cost you Alan Stephenson-Brown March 31, 2024March 31, 2024 General In a cloud world, Is Backup Still Relevant? Editors Desk March 31, 2024May 21, 2024 General World Backup Day: 3-2-1, ready? Editors Desk March 31, 2024March 29, 2024 General GDPR and the need for Cyber Insurance in Europe Editors Desk March 30, 2024April 12, 2024 Book Review Book Review: AI Doctor, take the money and run Lou Covey March 25, 2024December 20, 2024 General Data Security Posture Management (DSPM) Explained Ron Reiter March 21, 2024May 21, 2024 GeneralIn the newsPodcast Social media hangs itself in TikTok legislation Lou Covey March 19, 2024August 29, 2024 Scam Bucket Scam Bucket: Credit card fraud is inevitable Lou Covey March 14, 2024March 14, 2024 General Like Digital Cicadas, Cybercriminals Lie In Wait Before Unleashing Their Presence Lydia Zhang March 12, 2024March 12, 2024 General Breaking Barriers, Building Bridges: Inspiring Inclusion on International Women’s Day Editors Desk March 8, 2024July 10, 2024 cyber insuranceFeaturesGeneralPodcast Turning the corner on cyber insurance Lou Covey March 8, 2024April 6, 2024 In the news Biden data EO a step forward Lou Covey March 1, 2024April 6, 2024 Podcast Bad month for Cybercrime Lou Covey February 27, 2024February 26, 2024 General Navigating AI as a Double-Edged Sword Team Aqua Nautilus February 27, 2024February 26, 2024 General Dissecting the Anatomy of Ransomware Nazy Fouladirad February 22, 2024March 5, 2024 GeneralPodcast Biometrics and payment cards? Lou Covey February 20, 2024February 17, 2024 General How serious do companies take cybersecurity? David Jani February 15, 2024March 18, 2024 General The Era of AI-Powered Cyberthreats? Rik Ferguson February 15, 2024February 15, 2024 In the news Breach affects half of France Ebin Sandler, threat analyst, Cybersixgill February 14, 2024February 15, 2024 General Cyber Threats Impacting Enterprises in 2024 Anurag Lal February 14, 2024March 8, 2024 General How will AI change the cybersecurity industry? Editors Desk February 13, 2024December 20, 2024 General Tracking 2024’s top three cybersecurity threats Darren Thomson February 9, 2024February 14, 2024 General Report: 2024 Threat Landscape Yochai Corem February 8, 2024February 15, 2024 General Safer Internet Day: Cybersecurity Best Practices Sean Richards February 6, 2024February 6, 2024 Scam Bucket Scam bucket: “Brushing” scams are hard to defend Lou Covey February 6, 2024February 15, 2024 GeneralPredictions Experts leery of “benefits” of AI Lou Covey January 30, 2024January 31, 2024 General Our 2024 Predictions Issue is here Editors Desk January 30, 2024February 1, 2024 General 2024: The year of GenAI Gabriel Hopkins January 27, 2024February 6, 2024 Defense against the AI artsSocial media security Commentary: Move fast and break AI Lou Covey January 26, 2024January 27, 2024 General Five critical cybersecurity trends for 2024 Matt Lindley January 22, 2024February 1, 2024 GeneralPodcast Deepfakes, disinformation, billionaires and Zuckerberg top our list of most dangerous people on the internet Lou Covey January 18, 2024January 17, 2024 General More content, more possibilities: Our new subscription plan Editors Desk January 15, 2024January 16, 2024 Legislation Legislation and lawsuits influence development in 2024 Lou Covey January 12, 2024January 12, 2024 General Disinformation is the biggest problem in elections Lou Covey January 8, 2024January 8, 2024 GeneralScam Bucket Scam Bucket: The Paxful Wallet/Venmo Scam Lou Covey December 19, 2023January 5, 2024 General Cybersecurity Teams Have to Do More Than ‘Walk and Chew Gum at the Same Time’ Lydia Zhang December 13, 2023December 21, 2023 General How end-to-encryption can protect businesses from the increased risks of ChatGPT Istvan Lam December 5, 2023November 29, 2023 cyber hygieneDefense against the AI artsGeneralSocial Engineering Before you post, would you bet your job on it? Lou Covey December 5, 2023December 1, 2023 Defense against the AI artsPodcastSocial Engineering Study: Consumers ambivalent about deep fake content Lou Covey November 30, 2023November 27, 2023 General ChatGPT One Year On: The good, the bad and the unknown Editors Desk November 30, 2023November 30, 2023 General The #1 Way to Protect Against Cybersecurity’s Primary Threat Surface David Schiffer November 28, 2023November 23, 2023 General Black Friday Fears: Beating Cybercriminals to the Bargains Editors Desk November 24, 2023November 24, 2023 cyber hygieneKnow-HowPodcastSocial media security Privacy Not Included Group dings Amazon this year Lou Covey November 22, 2023January 2, 2024 General Navigating an identify-based approach to data security Stuart Hodkinson November 21, 2023January 2, 2024 General SEC v. SolarWinds: a tipping point for consolidation? Lou Covey November 14, 2023November 14, 2023 General The Hidden Hand of the Hacker Market Thomas Caliendo November 9, 2023November 9, 2023 General Navigating the Digital Battleground – Expert Voices on Cybersecurity Awareness Month Editors Desk November 6, 2023November 3, 2023 General Biden’s EOs on AI is more CYA than action Lou Covey November 2, 2023November 2, 2023 General Why Is Security Technology Not Working? Wes Kussmaul November 2, 2023November 13, 2023 General The Big Cybersecurity Error Companies Make and Four Steps To Correct It Jerry Derrick October 31, 2023October 28, 2023 General How the cybersecurity industry has changed with 20 years of Cybersecurity Awareness Month Editors Desk October 27, 2023October 27, 2023 FeaturesGeneral Opinion: Deprioritize social media for peace Editors Desk October 26, 2023October 26, 2023 FeaturesGeneral 7 Most Dangerous Cybersecurity Threats George Reeves October 21, 2023October 24, 2023 Frontpage special Social engineering criminals are after everyone Lou Covey October 18, 2023October 18, 2023 Frontpage special Ten ways to avoid being an online victim Lou Covey October 18, 2023October 18, 2023 General Special Report: Social Engineering and the MGM Grand Editors Desk October 18, 2023October 23, 2023 Frontpage special Unpacking the 15-min phone call that took down MGM/Caesars Lou Covey October 14, 2023October 23, 2023 General Secure Document Collaboration: Protecting Your Data Gregg Laroche October 11, 2023October 11, 2023 General Navigating the Future of Generative AI Laurent Duperval October 5, 2023October 3, 2023 Defense against the AI arts Podcast: Defense against the AI Arts Lou Covey October 3, 2023September 29, 2023 General Tips for Navigating the Cybersecurity Landscape Rachel Rose September 26, 2023September 29, 2023 General API Security, AI and the Consolidation of the Cybersecurity Industry Editors Desk September 24, 2023September 26, 2023 General Why Insider Threats Need a Zero Trust Approach Editors Desk September 21, 2023September 19, 2023 General Overcoming the Defender’s Dilemma with Generative AI and NLP Jens Schmidt September 21, 2023December 22, 2023 General Are Unparalleled AI Deployments Outpacing Cybersecurity Capabilities? Lydia Zhang September 19, 2023September 18, 2023 General Welcome to it-sa Lou Covey September 15, 2023December 22, 2023 General Cybersecurity in the Age of GenAI: Battling the Threat of Human Trafficking Maya Lahav September 14, 2023September 11, 2023 GeneralIn the newsPodcast Podcast: Canada in the crosshairs for cyber attack Lou Covey September 13, 2023September 13, 2023 General Zero Trust – mit Identitäts-Orchestrierung schnell zum Ziel Mehmet Yaliman September 13, 2023December 22, 2023 General Understanding Open-Source Software Attacks – the Hidden Security Risks Andy Swift September 12, 2023September 13, 2023 GeneralIn the news Campaign against Cobalt Strike malware progressing Lou Covey September 8, 2023September 13, 2023 General Emerging Cryptocurrency Scams: Red Flags and Prevention Lily Partin September 7, 2023August 30, 2023 Scam Bucket Scam bucket: USPS Smishing Lou Covey September 6, 2023September 6, 2023 General How Your Cybersecurity Strategy Can Combat Fake New Justine Robinson September 5, 2023August 25, 2023 General The Times they are A-changing: Women in Cyber Editors Desk September 1, 2023September 1, 2023 General These are your 5 most dangerous devices Editors Desk September 1, 2023August 30, 2023 General Cybersecurity market heading for a reckoning Lou Covey August 30, 2023August 29, 2023 General Unwanted Voice Traffic: A Growing Threat Impacts Businesses Editors Desk August 29, 2023August 18, 2023 General Is the way we recruit exacerbating the skills shortage? Jamal Elmellas August 24, 2023August 22, 2023 General Zero Trust Principles for Mid-Market Companies Denny LeCompete August 21, 2023August 21, 2023 cyber insuranceInterview Taking uncertainty out of cyber insurance Lou Covey August 18, 2023March 30, 2024 General Why it’s vital for companies to be responsible digital citizens Dr. Shaun McAlmont August 15, 2023August 11, 2023 Defense against the AI artsGeneral Standards bodies doing the heavy lifting in AI regulation Lou Covey August 11, 2023August 8, 2023 General Call for Content: We’re going offline – again. Editors Desk August 8, 2023August 8, 2023 GeneralInterview Hollywood strikes fight over ownership of biometrics Lou Covey August 4, 2023August 4, 2023 FeaturesGeneral From Coders to Protectors: Women’s Influence in Cybersecurity Gabrielle Lawson August 4, 2023August 4, 2023 General Ransomware: How to Prevent and Recover From an Attack Dakota Murphey July 27, 2023July 27, 2023 General R.I.P. Kevin Mitnick Editors Desk July 20, 2023July 20, 2023 Features AI is at war with itself Lou Covey July 20, 2023July 14, 2023 GeneralSocial media security Meta’s Threads threatens personal security for women seeking abortions Lou Covey July 18, 2023July 18, 2023 General Credential Harvesting: Understanding and Combating the Threat Matt Rider July 14, 2023July 14, 2023 cyber hygieneKnow-How Bolstering Workforce Security During Summer Holidays Omer Taran July 7, 2023July 5, 2023 cyber hygieneKnow-How Boosting digital hygiene without technology Lou Covey July 5, 2023June 29, 2023 General A Guide to Understanding Vulnerability Reporting and Scoring Barry Snow June 27, 2023June 28, 2023 General Cybersecurity needs cyber deception: stay alert and be aware Jason Gerrard June 22, 2023June 16, 2023 General Bridging the Gap: Empowering Women for a Stronger Cyber Security Future Dakota Murphey June 20, 2023June 16, 2023 General How UK organisations can prepare for the next wave of cybersecurity regulation Roman Cupka June 14, 2023June 14, 2023 Cheat Sheet Cloud Security Cheat Sheet: There’s an Acronym for That Lou Covey June 13, 2023May 20, 2024 Features Security issues, regulation, reality dull AI hype Lou Covey June 9, 2023June 9, 2023 General SAP Security Double Feature Editors Desk June 9, 2023June 9, 2023 General Cloud’s Silver Linings – The potential for More Consistently Secured Landscapes Jay Thoden van Velzen June 9, 2023September 14, 2023 General SAP Security Does Not Have To Be Complex Christoph Nagy June 9, 2023June 9, 2023 General The Cybersecurity Challenge: Why Human Expertise Matters Laurie Mercer June 5, 2023June 5, 2023 InterviewPodcast How companies are helping customers take responsibility for security Lou Covey June 1, 2023June 2, 2023 General Happy Anniversary GDPR: 5 years on, where do we stand? Editors Desk May 25, 2023May 25, 2023 General Mental Health Awareness Week 2023 – No more empty words Editors Desk May 23, 2023May 22, 2023 General TikTok Analysis: the onus is on us Lou Covey May 18, 2023May 18, 2023 General The Double-Edged Sword of AI & Cybersecurity Matt Morris May 15, 2023May 9, 2023 General Anti-Ransomware Day – Probe, Protect, and Prevent Editors Desk May 12, 2023 GeneralInterviewPodcastSocial Engineering Book Review: Data for All by John K. Thompson Lou Covey May 12, 2023May 9, 2023 General Phishing Kits: the new frontier of hacker attacks Lorenzo Asuni May 8, 2023May 17, 2023 General Here’s to a New Password-Less Day! Jasson Casey May 4, 2023May 10, 2023 General World Password Day 2023: Simple Habits To Protect Your Data Editors Desk May 4, 2023May 10, 2023 General The Growing Problem of Shadow APIs Chaim Peer May 2, 2023May 2, 2023 GeneralInterview Getting a handle on generative AI, before it gets a handle on us Lou Covey April 25, 2023May 11, 2023 General Is biometric technology secure? Exploring two scenarios Jonas Nilsson April 21, 2023April 20, 2023 GeneralInterview What’s up with TikTok Lou Covey April 18, 2023April 19, 2023 General Identity Management Day: the power of Prevention and Protection Editors Desk April 11, 2023April 10, 2023 General Raising the Stakes – the Evolving Threat of Ransomware Andy Swift April 5, 2023April 5, 2023 FeaturesGeneral Sextortion is criminal, but may not be a crime Lou Covey March 30, 2023March 21, 2024 FeaturesGeneral Generative AI tools are a blessing and a curse, but cybersecurity may lead to reason Lou Covey March 21, 2023March 21, 2023 FeaturesGeneral Bank collapse drives Phishing attacks Lou Covey March 14, 2023September 21, 2024 General How Innovative Security Solutions Can Neutralize Data Breaches Arti Raman March 10, 2023March 9, 2023 General Equity equals action this International Women’s Day Editors Desk March 8, 2023March 7, 2023 General Companies Turn to Behavior-Based Cybersecurity Training Laurent Duperval March 3, 2023March 7, 2023 FeaturesGeneralInterview A Trip to the Dark Side of ChatGPT Sergey Shykevich February 28, 2023September 21, 2023 General DDoS Attack Wave on Banks: How can Companies Protect Themselves? Ramil Khantimirov February 24, 2023February 24, 2023 GeneralInterview Quantum Computing: the next big thing or science fiction? Editors Desk February 17, 2023February 17, 2023 Frontpage specialGeneralInterview Interview with Rockwell and Honeywell CISOs on SOCs as a service Lou Covey February 15, 2023February 15, 2023 Frontpage specialGeneral SOCs as a service have become big business Lou Covey February 15, 2023February 15, 2023 General Cost of Cybercrime: Addressing Tight Budgets and an increasing Skills Gap Kevin Eley February 10, 2023February 11, 2023 General Safer Internet Day 2023: It’s a dangerous business, going online Editors Desk February 7, 2023February 7, 2023 General Playing it Safe in the Metaverse: Cyber Security Challenges in VR Andy Swift February 3, 2023January 27, 2023 General Getting ahead of NIS2: Prepare your organization and avoid the consequences. Claus Nielsen January 30, 2023January 27, 2023 FeaturesGeneral Data Protection Day 2023: A Priority Not An Option Editors Desk January 27, 2023January 27, 2023 General Automotive security: Digital hijacking of cars is far from reality Lou Covey January 24, 2023January 19, 2023 GeneralVideo Byte Prediction: The Growing Importance of API Security Editors Desk January 23, 2023January 19, 2023 General Ransomware Recovery: Why a multi-layered approach should be a priority Eric Bassier January 20, 2023August 31, 2023 General Diversity and opportunity in cyber, with Rockwell’s Nicole Darden Ford Lou Covey January 16, 2023January 16, 2023 General Supply Chain Cybersecurity Will Be a Leading Concern in 2023 Matt Lindley January 12, 2023January 16, 2023 GeneralInterview How Google enhances API security in the cloud Editors Desk January 11, 2023January 13, 2023 General Putting proactive API security first Liad Bokovsky January 9, 2023January 14, 2023 General Video Byte: Expert Predictions for 2023 – Part 2 Editors Desk December 29, 2022December 29, 2022 General 4 Cybersecurity Tips You Should Follow If You Work From Home Jen Bennet December 27, 2022March 21, 2023 General Video Byte: Experts Predictions for 2023 – Part 1 Editors Desk December 22, 2022December 29, 2022 General Exploring DRM as an Industry Standard Security Addition to File Transfers Chris Bailey December 20, 2022January 18, 2023 General Recession? What recession? George Barnes December 15, 2022January 14, 2023 GeneralKnow-How Protection against DDoS attacks: do’s and don’ts Ramil Khantimirov December 9, 2022December 9, 2022 General Computer Security Day: How to tackle ever advancing cyber threats Editors Desk November 30, 2022January 14, 2023 General Seven key principles behind a robust cybersecurity practice Gregg Lalle November 28, 2022November 28, 2022 General Black Friday – Deals, Hacks and Scams Aplenty Editors Desk November 25, 2022January 14, 2023 General Scam Bucket: Beware the ‘Unsubscribe’ button Lou Covey November 18, 2022November 18, 2022 General The most important security standard received an update Patrick Boch November 18, 2022January 14, 2023 General Zero Trust in Practice – Adopting and Sustaining it in Your Real-World Environment Chris Cooper November 15, 2022January 14, 2023 General The Cross-Sector Cybersecurity Performance Goals : What You need to Know Tyler Reguly November 8, 2022November 8, 2022 General Raising Awareness – a continuous challenge Editors Desk November 4, 2022November 4, 2022 General Are we catching up to cyber criminals? Lou Covey October 28, 2022October 28, 2022 General See yourself in Cyber – the human element is crucial Editors Desk October 26, 2022October 26, 2022 Generalzerto How to fight ransomware effectively Christopher Rogers October 24, 2022October 24, 2022 General The Evolving Role of the CISO Yehudah Sunshine October 21, 2022October 21, 2022 General Cybersecurity Awareness Month – How can Organisations Protect Themselves from Cyber Threats? Editors Desk October 17, 2022October 25, 2022 General Cybersecurity Awareness Month, part 3 Editors Desk October 14, 2022October 25, 2022 General Video: Modernizing SOCs Editors Desk October 12, 2022October 12, 2022 General More Thoughts on Cybersecurity Awareness Month Editors Desk October 10, 2022October 25, 2022 General Cheat Sheet: What is a “DNS” and why should I care? Lou Covey October 7, 2022October 7, 2022 General What famous identity thefts can teach our businesses nowadays Editors Desk October 7, 2022October 7, 2022 General Thoughts on Cybersecurity Awareness Month from around the Industry. Editors Desk October 5, 2022October 25, 2022 General Cyber Insurance Providers Buckling as Breaches Boom Dr. James Norrie September 30, 2022October 1, 2022 General Insider Threats in Your Digital Workplace Editors Desk September 28, 2022September 27, 2022 General Critics of election security are the real problem Lou Covey September 26, 2022August 29, 2024 General Scam Bucket: How common courtesy makes you vulnerable Lou Covey September 23, 2022 General IT Pro Day – Celebrating the Everyday IT heroes Editors Desk September 23, 2022September 21, 2022 General Cybersecurity seems to be bucking the trend against layoffs Lou Covey September 21, 2022September 16, 2022 General Tackling the Ransomware Threat Editors Desk September 19, 2022August 20, 2023 General Defanging the Horror of Quantum Computing Lou Covey September 15, 2022October 4, 2022 General Is that Really You – how business email is compromised Editors Desk September 13, 2022September 15, 2022 General Cybersecurity with limited talent and resources Dave Martin September 12, 2022September 9, 2022 General How Criminals Attack the Building Blocks of the Internet Chaim Peer September 8, 2022September 8, 2022 General How open source solutions support cloud security Rani Osnat September 6, 2022September 6, 2022 General Period Tracking Apps Imperil Women Lou Covey August 26, 2022August 24, 2022 General Optimism is a hard job. I love my job! Editors Desk August 25, 2022August 25, 2022 General Women’s Equality Day: A Day of Reflection for Women in Tech Editors Desk August 25, 2022August 25, 2022 General Security and the right to repair collide at DefCon Lou Covey August 19, 2022August 19, 2022 Cheat SheetGeneral How a medieval city can explain cloud security. Patrick Boch August 17, 2022May 21, 2024 GeneralInterview Video Byte: Why you need Hardware Security Editors Desk August 15, 2022August 16, 2022 General How to Incentivize the Cybersecurity Workforce Yehudah Sunshine August 12, 2022August 12, 2022 General Web Scraping: A Critical Tool For Threat Intelligence Andrius Palionis August 8, 2022August 6, 2022 General Roblox Hack: don’t let cybercriminals blindside you Editors Desk August 2, 2022March 27, 2023 General SysAdmins: The Unsung Heroes of the IT World Editors Desk July 29, 2022July 29, 2022 General How to protect personal data with technology Lou Covey July 22, 2022July 21, 2022 FeaturesGeneralInterview The Security Standard to rule them all Editors Desk July 20, 2022August 17, 2022 General Managing Cloud Security Costs David Martin July 15, 2022July 9, 2022 General Fighting back against lateral attacks Lou Covey July 13, 2022July 13, 2022 General Security Ideology Might be the Biggest Problem Sam Jones July 8, 2022July 6, 2022 General All Eyes on Critical Infrastructure as Authorities Call for Greater Cyber Resilience Paul Farrington July 1, 2022July 4, 2022 General There is no there in the Metaverse Lou Covey June 29, 2022June 23, 2022 General Cyber resilience for transport and logistic supply chains Mark Brown , Global Managing Director, Digital Trust Consulting at BSI. June 27, 2022June 27, 2022 General Bridging the gap: International Women in Engineering Day Editors Desk June 24, 2022June 24, 2022 General Affordable training in abundance Lou Covey June 23, 2022June 23, 2022 General World Productivity Day: Efficiency in the Technological Age Editors Desk June 20, 2022June 20, 2022 General Promoting Cybersecurity for Accountants Danielle Marshburn June 17, 2022June 17, 2022 General Is your freelancer a nation-state hacker? Lou Covey June 14, 2022June 14, 2022 General Ransomware 101: Keeping the lights on when hackers attack Christopher Rogers June 10, 2022June 14, 2022 General The Role of a Zero Trust Network in Your Organisation’s Digital Transformation Matthew Margetts June 6, 2022June 6, 2022 General Focus Social Engineering – building the security mindset June 3, 2022June 2, 2022 General The Psychology Behind Cybersecurity Stephen Moramarco May 30, 2022May 30, 2022 FeaturesGeneral Ransomware: The Worst is Yet to Come Lou Covey May 27, 2022May 23, 2022 General GDPR and the Future of Data Regulation Editors Desk May 25, 2022May 25, 2022 General WannaCry: Ransomware defence, five years on Editors Desk May 23, 2022May 13, 2022 General Colonial Pipeline: One year on from the ransomware attack that shocked the world Editors Desk May 20, 2022May 13, 2022 General Arqit Suit Pulls Back the Curtain on Quantum Lou Covey May 18, 2022May 13, 2022 General You Can’t Stop Cyberattacks on your Organization! Sagar Gupta May 16, 2022May 13, 2022 FeaturesGeneral Cyber Protection Magazine: Cloud Expo Issue Editors Desk May 11, 2022May 11, 2022 General Blazing a Trail to Zero Trust Lou Covey May 6, 2022May 9, 2022 GeneralWorld Password Day Password, qwerty, 123456: Leaving bad habits behind on World Password Day Editors Desk May 5, 2022May 5, 2022 General Scam Bucket: Bogus Emergency Data Requests Lou Covey May 4, 2022May 5, 2022 General Trending Topics: Phishing, Social Media and Malicious Email Attacks on the Rise John LaCour May 2, 2022May 2, 2022 General IoT Security is Bad, but there is hope Lou Covey April 29, 2022April 28, 2022 General Mitigate Cyber Risks During the Ukraine War Carlos Rivera April 25, 2022April 25, 2022 General Lawsuit Pulls Back Curtain on Quantum Crypto Industry Lou Covey April 23, 2022May 11, 2022 General Scam Bucket: Latest Russian Phishing Scam Lou Covey April 18, 2022April 18, 2022 General 4 Tips to Meet Cyber Insurance Requirements François Amigorena April 14, 2022March 30, 2024 Video Byte Video Bytes: Changing the Script on Cybersecurity Hiring, part 3 Editors Desk April 13, 2022April 11, 2022 General Identity Management Day 2022: Time to Be Identity Smart Editors Desk April 12, 2022April 12, 2022 FeaturesGeneral Ukraine war is fast-tracking cyber laws Lou Covey April 11, 2022April 11, 2022 FeaturesGeneral Russian Cyber Warfare capabilities overblown Lou Covey April 6, 2022April 6, 2022 Video Byte Video Bytes: Changing the Script on Cybersecurity Hiring Part 2 Editors Desk April 6, 2022April 6, 2022 General How Visibility Improves Security Editors Desk April 4, 2022April 4, 2022 General How Cybersecurity Businesses are Tackling the Ukraine War Morten Kjaersgaard April 1, 2022April 2, 2022 General Guess what!? Today is World Backup Day Lou Covey March 31, 2022March 31, 2022 General Back it up: The basics of World Backup Day Editors Desk March 31, 2022March 31, 2022 General Video Byte: Changing the Script on Cybersecurity Hiring Editors Desk March 30, 2022March 30, 2022 General API Security: The New North, South, East and West of Cybersecurity Giora Engel March 28, 2022March 28, 2022 Video Byte Video Byte: Endpoint Protection Editors Desk March 25, 2022March 25, 2022 General War, crime boost cryptocurrency regulation Lou Covey March 24, 2022March 24, 2022 GeneralScam Bucket Scam Bucket: Ice Phishing Lou Covey March 21, 2022March 17, 2022 General What Is Pentesting? A Complete Overview Zach Norton March 18, 2022March 17, 2022 GeneralInterview Consumer Cybersecurity: Watch for Miners Editors Desk March 14, 2022March 14, 2022 FeaturesGeneral The 5 Most Secure Messaging Apps Lou Covey March 11, 2022April 25, 2022 FeaturesGeneral Women in Technology: Time to #Breakthebias Editors Desk March 8, 2022March 8, 2022 FeaturesGeneral Break The Bias: International Women’s Day Editors Desk March 8, 2022March 8, 2022 FeaturesGeneral Popular Apps Endanger Ukrainians. Lou Covey March 2, 2022March 2, 2022 FeaturesGeneral How to get rich with ransomware Patrick Boch February 28, 2022February 24, 2022 Frontpage special Support Ukraine Editors Desk February 27, 2022February 27, 2022 General Ukraine: Open Warfare in the Cyber World Lou Covey February 26, 2022February 26, 2022 General Why phishing is cybersecurity’s biggest threat this year Jonathan Wood February 22, 2022February 22, 2022 General How Cybersecurity Issues Affect Stock Prices Justine Robinson February 18, 2022February 22, 2022 General The Case for Business Logic in Software Development Nathan Sitbon February 10, 2022February 10, 2022 General The Mirai Botnet Returns, But Don’t Panic Lou Covey February 10, 2022February 9, 2022 Cheat SheetGeneralKnow-How Cheat Sheet: 3 Best Tips for Safer Internet Day Patrick Boch February 8, 2022February 17, 2022 General The Gold Standard of Data Governance: Choosing the Right Tools Michael Queenan February 7, 2022February 6, 2022 General Decentralizing data can frustrate hackers Lou Covey February 4, 2022February 4, 2022 FeaturesGeneral Protecting APIs: Our First Magazine is Out! Editors Desk February 1, 2022February 10, 2022 Frontpage specialGeneral Special: Data Privacy Day Editors Desk January 28, 2022January 28, 2022 Frontpage specialGeneral Data Protection Day 2022: Prioritising data protection in a changing world Editors Desk January 28, 2022January 28, 2022 Frontpage specialGeneral When data collection protects your identity Lou Covey January 28, 2022January 28, 2022 Frontpage specialGeneral Why is data protection training crucial for organisations? Jason Stirland January 28, 2022January 28, 2022 General Cybersecurity Challenges Facing Critical Infrastructure Justine Robinson January 28, 2022January 24, 2022 General Healthcare OT Facilities Remain Exposed as Industry Experiences Ransomware Attacks Ilan Barda January 26, 2022January 24, 2022 General The future of ransomware Editors Desk January 24, 2022January 24, 2022 FeaturesGeneral Insurance industry using weak reasons to not pay Lou Covey January 17, 2022January 17, 2022 General Top Skills for Cybersecurity Professionals to Prepare for the Future of Work Maria Elena Gonzalez January 10, 2022February 1, 2022 General Not if, but when: Why it’s time to prepare for the quantum threat Ali El Kaafarani January 7, 2022January 5, 2022 General Stalking with Bluetooth tracking devices Lou Covey January 5, 2022January 6, 2022 General Patching in the Modern Organization: Why a Key Security Control Is Still Overlooked Mike Walters January 3, 2022December 30, 2021 General Retrospective: praise for the cybersecurity experts out there Patrick Boch December 31, 2021January 28, 2022 Frontpage specialGeneral Predictions Finale: Legislation, standards drive chip security in 2022. Lou Covey December 29, 2021January 28, 2022 General 5 Tips for Industrial IoT Security to Defend Against Cyberattacks Michael Yehoshua December 27, 2021December 25, 2021 General Is your future “cloudy”? It should be Mark Quesnel December 25, 2021December 25, 2021 General ‘Tis the Season…for Cyberattacks! Motti Elloul December 24, 2021December 26, 2021 FeaturesGeneral Common technology could blunt flash mob thievery Lou Covey December 22, 2021December 20, 2021 General Special: What does 2022 hold in store? Editors Desk December 21, 2021January 28, 2022 Frontpage specialGeneral More Predictions on Cybersecurity in 2022 – Part 3 Editors Desk December 20, 2021January 28, 2022 Frontpage specialGeneral Cybersecurity Predictions for 2022 – Part 2 Editors Desk December 20, 2021January 28, 2022 GeneralInterview 5G Networks are on the Rise: Faraday Bags protect your electronic devices (with Video) Editors Desk December 20, 2021January 5, 2022 General Fortify your business: 5 practices for stellar cybersecurity Oliver Noble December 17, 2021December 14, 2021 General Make semiconductors secure… or else Lou Covey December 15, 2021December 17, 2021 GeneralInterview Roundtable IoT Security – The Black Out will come Editors Desk December 13, 2021January 5, 2022 General log4j: What You Need To Do now Editors Desk December 12, 2021December 12, 2021 Frontpage specialGeneral The changing world of cybersecurity: expected trends in the world of cyber for 2022 Editors Desk December 10, 2021January 28, 2022 General UK Data Protection Laws: Stay Updated And Be Prepared Jakub Lewandowski December 6, 2021January 28, 2022 General Top 3 Mistakes Companies Make with Security & Compliance Troy Fine December 2, 2021December 1, 2021 General System Storage: What Does It Hold and How to Optimize It? Editors Desk November 30, 2021November 30, 2021 General Computer Security Day: Technology, Training and Trust Editors Desk November 30, 2021November 27, 2021 General Bag a bargain safely this Black Friday weekend Editors Desk November 25, 2021November 25, 2021 FeaturesGeneralInterview Video Interview: Finding Threats within your network – for free Editors Desk November 25, 2021November 25, 2021 General Automation promotes consistency in API security Lou Covey November 22, 2021November 22, 2021 InterviewVideo Byte Video Byte: Security Service Edge Editors Desk November 17, 2021December 1, 2021 General How to Strengthen Your Organisation’s Password Hygiene Jason Stirland November 12, 2021May 10, 2023 General Myths, statistics and holistic security – are insiders the real problem? Lou Covey November 10, 2021November 9, 2021 General Want Better Cybersecurity? Look Left Instead of Right Graham Hunter November 8, 2021November 9, 2021 General How Companies Can Combat Employees Pushing Back Against Cybersecurity Methods Justine Robinson November 5, 2021November 2, 2021 General Multi-Layered Security Wins the Digital Transformation Gold Rush David Schiffer November 3, 2021October 31, 2021 Features Security first needs to be in every company’s DNA Patrick Boch November 1, 2021November 2, 2021 FeaturesGeneralKnow-HowScam Bucket Scam Bucket: Microsoft reveals year-old Franken-phish campaign Lou Covey October 27, 2021October 28, 2021 General #BeCyberSmart This Cybersecurity Awareness Month Editors Desk October 25, 2021October 25, 2021 General Best Messaging Apps to Keep Your Data Private and Secure Brad Smith October 21, 2021October 18, 2021 General How the Dark Web works Editors Desk October 19, 2021October 16, 2021 FeaturesGeneral Building a collaborative security team: Case Study Lou Covey October 17, 2021December 1, 2021 FeaturesGeneral Is ‘API Security’ an oxymoron? Lou Covey October 13, 2021October 16, 2021 General When Securing OT Facilities, BAS Provides a Much-Needed Mirror Ilan Barda October 11, 2021October 11, 2021 FeaturesGeneral Digital Transformation: The leading factor for API attacks Sharon Mantin October 9, 2021October 16, 2021 GeneralKnow-How How Zero Trust supports IT and OT security Nathan Howe October 7, 2021August 16, 2022 GeneralKnow-How Scam Bucket: Phishing, Smishing: It’s mostly Facebook’s fault Lou Covey October 4, 2021October 28, 2021 Features Taking charge of the API security lifecycle Editors Desk September 30, 2021October 16, 2021 General German election: “Responsibility for cyber security remains with the private sector” Editors Desk September 29, 2021September 29, 2021 General Are Collaboration Tools Compromising Your Data Security? Tim Bandos September 27, 2021September 24, 2021 General Risk Assessment & Evaluation Process for Open Source Sagar Gupta September 24, 2021September 27, 2021 General Planning Your Post-Pandemic Cybersecurity Strategy Justine Robinson September 22, 2021September 22, 2021 GeneralKnow-HowScam Bucket Scam Bucket: Dusting your way to a breach Lou Covey September 17, 2021October 28, 2021 General Bridging the skills gap this National Coding Week 2021 Editors Desk September 15, 2021September 14, 2021 FeaturesGeneral Threats to satellites challenge cybersecurity community Lou Covey September 13, 2021September 13, 2021 InterviewVideo Byte Video Byte: Cybercriminals go after the little guys, cybersecurity goes after the big guys Editors Desk September 10, 2021September 10, 2021 General How Does CIEM Reduce Identity Access Risk? Yehudah Sunshine September 6, 2021September 6, 2021 Cheat SheetGeneralKnow-How The Cybersecurity Cheat Sheet: Zero Trust Patrick Boch September 2, 2021October 28, 2021 General IT security escalation management must be part of every contingency plan Arno van Züren August 27, 2021August 27, 2021 InterviewVideo Byte Video Byte: Zero Trust doesn’t exist, but it should Editors Desk August 25, 2021September 10, 2021 GeneralInterview Interview: the Link between Identity, Zero Trust and Ransomware Editors Desk August 23, 2021August 23, 2021 General Researchers unwittingly assist in cybercrime Lou Covey August 20, 2021August 19, 2021 General Why It’s Time To Migrate From On-premises To Cloud-based SIEM Solutions Samantha Humphries August 18, 2021August 30, 2021 General Do’s and don’ts for digital pornography Lou Covey August 16, 2021August 16, 2021 GeneralVideo Byte Video Byte: How to fight ransomware with backups Editors Desk August 13, 2021September 10, 2021 General Solving Caveats In Open Source Vulnerability Management Sagar Gupta August 11, 2021July 26, 2021 General Could private network solutions be the security utopia enterprises are longing for? Mark Bole August 9, 2021July 30, 2021 General How suppliers trigger ransomware attacks, cripple your business Jonathan Wood August 6, 2021July 30, 2021 General WFH turned cybersecurity on its head Lou Covey August 4, 2021August 4, 2021 FeaturesGeneral Panel says CEOs facing pressure to bolster security Lou Covey August 4, 2021August 3, 2021 General Dramatic rise in claims due to hacker attacks Hanno Pingsmann August 2, 2021July 15, 2021 General SysAdmin Day 2021: Appreciating the Unsung Heroes of the IT world Editors Desk July 30, 2021August 6, 2021 FeaturesGeneral Search for the security holy grail: Isolating the bad guys Lou Covey July 28, 2021July 30, 2021 Interview Roundtable IoT Security – when they know what you are doing Editors Desk July 26, 2021July 23, 2021 General Interview: Women in Cyber and Open Source Security Editors Desk July 23, 2021July 16, 2021 General Interview: Prevention vs. Recovery – how to handle ransomware attacks Editors Desk July 21, 2021July 15, 2021 General In The World Of Connected IoT Devices, How Can Enterprises Ensure Device Security? Michael Yehoshua July 19, 2021July 30, 2021 GeneralInterviewVideo Byte Video Byte Special: What is Identity? Editors Desk July 16, 2021September 10, 2021 General Ransomware evolving ominously Lou Covey July 15, 2021July 30, 2021 General How organisations can establish true visibility using CASB and Zero Trust Kevin Schwarz July 12, 2021July 9, 2021 GeneralVideo Byte Video Byte: Why is Ransomware so popular? Editors Desk July 9, 2021September 10, 2021 General Pentesting is the first step in the Holy Grail of security Lou Covey July 6, 2021July 6, 2021 Generalzerto Why Data Protection Cloud Strategies Are Now Mission-Critical Gijsbert Janssen van Doorn July 2, 2021July 7, 2021 General Secure and Private Compute Summit: Security Throughout the Data Lifecycle. Editors Desk June 28, 2021June 28, 2021 General A look inside the editorial process of Cyber Protection Magazine Editors Desk June 27, 2021June 27, 2021 Interview Interview: Merging the Spheres of Identity Editors Desk June 25, 2021June 25, 2021 General World Productivity Day: Adjusting to the ‘New Normal’ Editors Desk June 23, 2021June 22, 2021 InterviewVideo Byte Video Byte: Cloud Security and Software Defined Perimeter Editors Desk June 21, 2021September 10, 2021 General How hackers are building data fountains through webscraping Editors Desk June 18, 2021June 18, 2021 FeaturesGeneral Cybersecurity opportunities abound… if you can find them Lou Covey June 11, 2021June 14, 2021 GeneralInterviewVideo Byte Video Byte: SMBs are a big target for cybercrime Editors Desk June 9, 2021September 10, 2021 General Caveats In Open Source Vulnerability Management Sagar Gupta June 7, 2021June 3, 2021 GeneralInterview Interview: the security and future of blockchain technology Aggelos Kiayias June 4, 2021July 7, 2021 General Secure Cloud Services for Remote Machine Access Blanch Huang May 31, 2021May 28, 2021 GeneralKnow-How Do you really know cloud security? Michael Cichosz May 28, 2021May 26, 2021 GeneralKnow-How You weren’t hacked, you were spoofed. Lou Covey May 26, 2021May 27, 2021 General Vehicles Equal More Than Thirty Computers, Now Imagine the Security Risk Michael Dick May 24, 2021May 25, 2021 General Portrait of a changing landscape: Five key security trends affecting businesses in a post-COVID world Anurag Kahol May 21, 2021August 6, 2021 General Normalising data leaks: A dangerous step in the wrong direction Editors Desk May 18, 2021May 18, 2021 General The bright side of cyberwarfare Lou Covey May 17, 2021May 14, 2021 General Disaster Recovery And The Impact On Business Survival Mark Jow May 14, 2021May 13, 2021