Cyber threat intelligence is a vital strategy that prevents attacks, and web scraping is critical to its success.
Last updated on August 2nd, 2022 at 08:42 am
Recent

Demystifying Quantum Cryptography
The NIST announcements about 4 algorithm standards to protect against quantum computing hacks had marketing departments go into overdrive. We decided it’s time to start demystifying quantum cryptography.

Roblox Hack: don’t let cybercriminals blindside you
Last month, it was reported that Roblox – an online game creation platform – had suffered a data breach after one of its employees fell

Fighting back against lateral attacks
Lateral attacks are a problem for the gaming industry, especially online games. Hackers use it not only to steal identities but to infiltrate corporate and
Features

The 5 Most Secure Messaging Apps
There is no lack of lists for the “best” secure messaging apps but we’ve noticed a few things about them: Not all apps on the lists are inherently secure. Hence, here is our list.

Women in Technology: Time to #Breakthebias
The second part of our article for today’s international women’s day – more quotes from the industry on #BreakThe Bias

Break The Bias: International Women’s Day
It’s International Women’s Day! Cyber Protection Magazine spoke with executives from various companies to learn how women in cybersecurity can #BreakTheBias

Cyber civil war erupts over Ukraine
In recent weeks leading up to and through the invasion of Ukraine, divisions have formed within the hacker community worldwide. So obvious, in fact, that we may be witnessing a civil war within that community
Expert Section
Featured Event
Company Blogs
Voices in Cybersecurity
Know-How
Newsletter
Read our archived Newsletters here.
Podcast

SCOTUS draft ruling puts women’s privacy at risk
Women’s privacy is at risk unless they adopt a Zero-Trust philosophy to digital media. Doing so does not require deep technical knowledge. The tools to protect themselves are available and free.
Latest Video
Articles

There is no there in the Metaverse
The Metaverse is the decentralized web so you keep control of your data…. except for the corporations looking to make sure they control it before

Cyber resilience for transport and logistic supply chains
Cyber resilience for transport and logistic supply chains

Bridging the gap: International Women in Engineering Day
International Women in Engineering Day focuses attention on the many opportunities for women in engineering – as well as celebrating those paving the way.

Affordable training in abundance
The lack of security professionals isn’t because of a lack of affordable training

World Productivity Day: Efficiency in the Technological Age
It’s World Productivity Day, and Cyber Protection Magazine spoke to nine technology experts to get their tips on how to motivate and get the most out of their workforce and help to increase productivity in the cybersecurity industry.

Promoting Cybersecurity for Accountants
Often, the weakest link in cybersecurity is considered to be people, as 85% of successful cyberattacks involve some form of human element. Employees in accounting are highly vulnerable to these breaches.

Meta simplifies privacy doc, but your data isn’t safe (updated)
Meta simplifies privacy doc, but your data isn’t safe

Is your freelancer a nation-state hacker?
The Biden administration warned in May that the freelancer you hired to code may be a North Korean spy. These cyber spies are posing as remote, contract IT workers and infiltrating malware into all forms of networks

Ransomware 101: Keeping the lights on when hackers attack
Ransomware attackers are reliant on a business’ inability to recover. In this article, Christopher Rogers from Zerto explains what companies can do to prioritize recovery.

The Role of a Zero Trust Network in Your Organisation’s Digital Transformation
Traditionally, security architectures focused on protecting the network. In a connected world, this approach is no longer effective. A zero trust security architecture is essential for every organisation.

Focus Social Engineering – building the security mindset
Criminals increasingly turn to the weakest link in the security chain – people. Social Engineering attacks are on the rise. Read about what social engineering is, its most common forms and, of course, how to counter it