Establishing consistency in security protocols is a challenge for any organization developing and implementing APIs. Judicious use of automation can mitigate development delays and facilitate development, as panel discussion showed.
Last updated on April 4th, 2022 at 07:18 pm
Recent

Video Byte: Security Service Edge
SASE, CASB, Zero Trust, SSE – confused yet by all the abbrevations and acryonyms? Cybersecurity ist a highly dynamic field, and even the analysts find it hard to keep up.
We asked Mike Schuricht, VP Products at Forcepoint, to shed some light on Security Service Edge and explains its relationship to SASE and some other cybersecurity abbreviations in this Video Byte.

How to Strengthen Your Organisation’s Password Hygiene
For organisations, employees neglecting to set strong passwords or having poor password habits can increase vulnerability to its cybersecurity strategy. sing strong passwords for account logins is one of the basic steps, yet time and time again, employees fail to comply with security policies at work.

Myths, statistics and holistic security – are insiders the real problem?
A 17-year-old FBI report claimed that 80 per cent of data breaches originate internally. A recent report on Statista, demonstrates that the problem is much more nuanced.
Event
Company Blogs
Voices in Cybersecurity
Know-How
Newsletter
Read our archived Newsletters here.
Podcast

SCOTUS draft ruling puts women’s privacy at risk
Women’s privacy is at risk unless they adopt a Zero-Trust philosophy to digital media. Doing so does not require deep technical knowledge. The tools to protect themselves are available and free.
Latest Video
Articles

California grant program is a security nightmare
Government’s inability to protect citizen data resulted in at least $36 billion in cyber fraud this year. California may be getting ready to add to that total and setting up small businesses to be hit hard by hackers.

Data Protection Day: Schrems II: The SME dilemma
Data Protection Day is a time to remind organizations across all industries and sizes about the important of data protection. Lately we’ve seen a lot of regulations like the GDPR or Schrems II, all small steps towards a proper data protection to secure personal data and give the topic the deserved recognition.
With the ruling of the European Court of Justice in the Schrems II case, pressure is growing on small and medium-sized companies to re-evaluate their processes and procedures and adapt them to the regulations of the EU GDPR. Mareike Vogt, data protection expert at TÜV SÜD, takes a closer look at this current topic.

Podcast: The hackers won’t let you go. Time to go after them
In cooperation with our correspondent from SIlicon Valley, Lou Covey, Cybersecurity Magazine is pleased to now offer podcasts. In this episode, John Flory III, CISO for Harbor Networks, explains why it is necessary to go on offense with ransomware attacks.

Patience and persistence trump technology in SolarWinds attack
As soon as the SolarWinds breach hit the news, press releases started pouring out of the cyber security industry with claims that their products or services would have prevented the breach, but talking to people in the trenches, that is a dangerous claim to believe. The truth it, human error and intention can defeat any security protocol or technology. We talked to Matthew Rosenquist and Steve Hanna about the only way to deal with security: vigilance.

A christmas goodie: „Het Virus“ by Eddy Willems
Something unusual for Christmas from Cybersecurity-Magazine: our first book review. “Het Virus” by Eddy Willems and Alain Dierckx.
Happy Holidays from Cybersecurity Magazine!