Encryption is a critical component of cybersecurity strategies. By making use of various algorithms to scramble data, encryption renders information unintelligible to anyone not authorised to access it. In this sense, it guarantees that compromised data is secure from unauthorised access, even if the system or device is physically stolen, illegally accessed, or lost.
The tech industry has made significant progress in bringing more women and girls into the field throughout the recent years. International Women’s Day highlights this growth, yet also acts as an indicator that there is still lots to be done in order to reach the level of gender equality we are striving for.
It seems like the insurance industry is turning the corner on cyber insurance and making a decent profit in the process. But not every industry watcher is optimistic.
This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.
Taken from our latest special issue, Alex Leadbeater, ETSI’s Chair of Cybersecurity discusses their IoT-Security standard
Even though ransomware attacks declined for the first half of this year, the worst is yet to come, experts say.
Our first printed special edition of Cyber Protection Magazine is here. This time the issue is not only available in digital form, a printed version is also available on the Cloud Expo Europe in Frankfurt. Consequently, we have a few topics we discuss in this issue.
Thanks to Vlad “The Invader” Putin, the EU, UK and US are fast-tracking cyber laws. But some experts think the laws and regulations lack proper incentives beyond fines and prosecution.
There is one thing we learned from the Ukraine war: the Russian army is not nearly as powerful as we believed it was. That goes for their cyberwarfare capabilities as well – find out why in our latest Crucial Tech podcast.
There is no lack of lists for the “best” secure messaging apps but we’ve noticed a few things about them: Not all apps on the lists are inherently secure. Hence, here is our list.
Read our archived Newsletters here.
The healthcare industry is a vulnerable target of cybercriminals, but not for the reasons most business sectors are. Between 80 and 90 percent of all cybercrime results from people not following basic cyber hygiene practices, but in healthcare criminals gain access to information through infrastructure weaknesses and the murky third-party agreements.
From our predictions issue: The cybersecurity landscape in 2024 is poised for significant developments and challenges. This report offers valuable insights into the evolving threat landscape and the measures needed to mitigate risks effectively.
Safer Internet Day aims to raise awareness among young people of online issues. But they’re not the only ones who need to be aware of online safety. Businesses are just as vulnerable to cyber threats if they don’t protect themselves appropriately.
“Brushing” scams are one of the rarer internet crimes and are hard to defend once started. They can range from relatively benign pranks to outright identity theft. Most commonly found on Amazon, they can occur on any e-commerce site that uses customer reviews to boost products.
The heading says it all: Our latest issue, focusing on predictions for 2024, has finally arrived.
From our predictions issue: With the new year, CIOs must educate and prepare themselves for the upcoming obstacles they may face in the future and implement ways to stay ahead and double down to protect themselves and their clients from potential vulnerabilities.
This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.