Skip to content
  • Topics
    • Expert Opinions
    • Video Byte
    • Interviews
    • Security Basics
    • All Articles
  • Magazine
  • Newsletter
  • Podcast
  • Contact
  • About
    • Authors
    • Partners
    • Submit
    • Who we are
Cyber Protection Magazine

Cyber Protection Magazine

The online magazine for cybersecurity and data protection

You are here:Home » Archives for Lou Covey

Author: Lou Covey

General 

Arqit Suit Pulls Back the Curtain on Quantum

Lou Covey May 18, 2022May 13, 2022cloud, development, encryption, insurance, IoT, journal, Multi-factor authentication, OT, quantum, Quantum computing, Quantum cryptography, review

The Arqit shareholder fraud lawsuit is pulling back the curtain on the Quantum computing industry. Before it’s over we may see how much is FUD, snake oil and legitimate.

Read more...
General 

Blazing a Trail to Zero Trust

Lou Covey May 6, 2022May 9, 2022cybersecurity, OT, zero trust

Cybersecurity is a mystery to most people and organizations and the industry isn’t very helpful in clearing that up. Zero Trust (ZT) is a good first step but it, too, is a black hole of confusing information. But there are some individuals that are blazing a trail to ZT.

Read more...
scam bucket
General 

Scam Bucket: Bogus Emergency Data Requests

Lou Covey May 4, 2022May 5, 2022CISO, expert, Facebook, identity, OT

Hackers have a new way of stealing data: impersonating members of law enforcement agencies and making emergency data requests (EDR) for information.

Read more...
General 

IoT Security is Bad, but there is hope

Lou Covey April 29, 2022April 28, 20225g, apt, cybersecurity, GDPR, IoT, OT, password, privacy, risk

We caught up with founder and CEO of Cyberus Labs, Jack Wolosewicz on his view on the future of security in IoT and 5G technology.

Read more...
General 

Lawsuit Pulls Back Curtain on Quantum Crypto Industry

Lou Covey April 23, 2022May 11, 2022development, encryption, OT, quantum, Quantum computing, Quantum cryptography, risk

Last updated on May 11th, 2022 at 08:51 amThe benefits of quantum computing are a bit hazy, but the danger of the technology is significant.

Read more...
scam bucket
General 

Scam Bucket: Latest Russian Phishing Scam

Lou Covey April 18, 2022April 18, 2022cyber attack, cybercrime, Darknet, identity, OT, phishing, spoofing

The Russian cyber offensive against the West finally hit last week and it was a pretty weak phishing scam.

Read more...
Features General 

Ukraine war is fast-tracking cyber laws

Lou Covey April 11, 2022April 11, 2022CISO, cloud, Cloud computing, compliance, cybercrime, cybersecurity, data privacy, expert, focus, GDPR, identity, network, OT, privacy, risk

Thanks to Vlad “The Invader” Putin, the EU, UK and US are fast-tracking cyber laws. But some experts think the laws and regulations lack proper incentives beyond fines and prosecution.

Read more...
Features General 

Russian Cyber Warfare capabilities overblown

Lou Covey April 6, 2022April 6, 2022cybersecurity, Cyberwarfare, focus, insurance, OT

There is one thing we learned from the Ukraine war: the Russian army is not nearly as powerful as we believed it was. That goes for their cyberwarfare capabilities as well – find out why in our latest Crucial Tech podcast.

Read more...
General 

Guess what!? Today is World Backup Day

Lou Covey March 31, 2022March 31, 2022attacks, backup, cyber attack, OT

Backups will improve your resilience against cyber attacks. For today’s World Backup Day we have a special episode of our Crucial Tech podcast to highlight the importance of backing up your data.

Read more...
General 

War, crime boost cryptocurrency regulation

Lou Covey March 24, 2022March 24, 2022attacks, blockchain, Cryptocurrency, Cyberattack, cybercrime, cybersecurity, development, insurance, OT, phishing, ransom, Ransomware, risk, SAST

An illegal war and a growing criminal use are driving efforts to regulate the unregulated cryptocurrency market.

Read more...
  • ← Previous
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy


The views and opinions expressed on Cyber Protection Magazine are those of the authors and do not necessarily reflect the official policy or position of Cyber Protection Magazine. Any content provided by our bloggers or authors are of their opinion and are not intended to malign any club, organization, company, individual or anyone or anything.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Posting....