Skip to content
  • Topics
    • Expert Opinions
    • Video Byte
    • Interviews
    • Security Basics
    • All Articles
  • Magazine
  • Newsletter
  • Podcast
  • Contact
  • About
    • Authors
    • Partners
    • Submit
    • Who we are
Cyber Protection Magazine

Cyber Protection Magazine

The online magazine for cybersecurity and data protection

You are here:Home » Features

Features

The NIST cryptography standards process
Features General 

Demystifying Quantum Cryptography

Lou Covey August 5, 2022August 5, 2022attacks, brute force, development, encryption, Interview, marketing, network, OT, private network, quantum, Quantum computing, Quantum cryptography, Virtual private network

The NIST announcements about 4 algorithm standards to protect against quantum computing hacks had marketing departments go into overdrive. We decided it’s time to start demystifying quantum cryptography.

Read more...
Features General 

Ransomware: The Worst is Yet to Come

Lou Covey May 27, 2022May 23, 2022api, attacks, Bitcoin, CISO, Cryptocurrency, Cyberattack, cybersecurity, Data recovery, Disaster recovery plan, expert, IoT, Multi-factor authentication, network, OT, password, ransom, Ransomware, risk, SAST

Even though ransomware attacks declined for the first half of this year, the worst is yet to come, experts say.

Read more...
Features General 

Cyber Protection Magazine: Cloud Expo Issue

Editors Desk May 11, 2022May 11, 2022api, attacks, cloud, Cyberattack, cybersecurity, Interview, IoT, mfa, OT, sap

Our first printed special edition of Cyber Protection Magazine is here. This time the issue is not only available in digital form, a printed version is also available on the Cloud Expo Europe in Frankfurt. Consequently, we have a few topics we discuss in this issue.

Read more...
Features General 

Ukraine war is fast-tracking cyber laws

Lou Covey April 11, 2022April 11, 2022CISO, cloud, Cloud computing, compliance, cybercrime, cybersecurity, data privacy, expert, focus, GDPR, identity, network, OT, privacy, risk

Thanks to Vlad “The Invader” Putin, the EU, UK and US are fast-tracking cyber laws. But some experts think the laws and regulations lack proper incentives beyond fines and prosecution.

Read more...
Features General 

Russian Cyber Warfare capabilities overblown

Lou Covey April 6, 2022April 6, 2022cybersecurity, Cyberwarfare, focus, insurance, OT

There is one thing we learned from the Ukraine war: the Russian army is not nearly as powerful as we believed it was. That goes for their cyberwarfare capabilities as well – find out why in our latest Crucial Tech podcast.

Read more...
Features General 

The 5 Most Secure Messaging Apps

Lou Covey March 11, 2022April 25, 2022apt, cloud, development, encryption, Facebook, ICloud, IoT, OT, privacy, sap, video, WhatsApp

There is no lack of lists for the “best” secure messaging apps but we’ve noticed a few things about them: Not all apps on the lists are inherently secure. Hence, here is our list.

Read more...
Features General 

Women in Technology: Time to #Breakthebias

Editors Desk March 8, 2022March 8, 2022expert, network, OT

The second part of our article for today’s international women’s day – more quotes from the industry on #BreakThe Bias

Read more...
Features General 

Break The Bias: International Women’s Day

Editors Desk March 8, 2022March 8, 2022blockchain, cybersecurity, focus, marketing, OT, review

It’s International Women’s Day! Cyber Protection Magazine spoke with executives from various companies to learn how women in cybersecurity can #BreakTheBias

Read more...
Features General Podcasts 

Cyber civil war erupts over Ukraine

Lou Covey March 4, 2022April 2, 2022api, attacks, black hat, cyber attack, Cyberattack, cybersecurity, Malware, network, OT, phishing, ransom, Ransomware, recruiting

In recent weeks leading up to and through the invasion of Ukraine, divisions have formed within the hacker community worldwide. So obvious, in fact, that we may be witnessing a civil war within that community

Read more...
Features General 

Popular Apps Endanger Ukrainians.

Lou Covey March 2, 2022March 2, 2022backup, cloud, encryption, Facebook, ICloud, Malware, OT, privacy, sap, WhatsApp

Text messaging has been around almost as long as the internet and predates mobile phones altogether. It’s not only a great way to surveil unwitting people but a great avenue for cybercriminals and oppressive nation-states to infect personal devices with malware.

Read more...
  • ← Previous
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy


The views and opinions expressed on Cyber Protection Magazine are those of the authors and do not necessarily reflect the official policy or position of Cyber Protection Magazine. Any content provided by our bloggers or authors are of their opinion and are not intended to malign any club, organization, company, individual or anyone or anything.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT