The Dynamic Duo – Why Modern Businesses Need the CIO and CISO to Collaborate

The Dynamic Duo – Why Modern Businesses Need the CIO and CISO to Collaborate

For any cybersecurity or data protection strategy to succeed, organisations need to rely on strong internal collaboration and communication processes. In particular, the CIO/CISO dynamic can have a significant impact on both short- and long-term decision making, from strategic investment decisions to leading the response to security incidents.

pile of smartphones

These are your 5 most dangerous devices

If you look around your house or office, you’ll be surprised which of your devices are the most risky. Spoiler: It’s not your computer.

Richard Stiennon discusses marketing

Cybersecurity market heading for a reckoning

The cybersecurity market is heading for a reckoning without serious adjustments to marketing strategies. Recent reports, including one from Dimensional Research, showed large enterprises are planning significant cuts in budgets for security tools and services. Moreover, the vendors facing those

woman in black long sleeve shirt using black laptop computer

Unwanted Voice Traffic: A Growing Threat Impacts Businesses

A new report shows the growing threat of unwanted voice traffic and its pervasive impact on enterprises worldwide.

group of people using laptop computer

Is the way we recruit exacerbating the skills shortage?

The shortage in cybersecurity experts has led businesses to compete in earnest over a small pool of talent and the consequences of this are that more cybersecurity professionals are changing jobs than ever.

We keep advertising at a minimum to maintain independence. That means we need support from our readers.

How about you buy us a coffee?

Video Bytes: Changing the Script on Cybersecurity Hiring, part 3

In our thrid episode with Matt Donato we look at the candidate experience in the hiring process; where it goes right and where it goes wrong.

Identity Management Day 2022: Time to Be Identity Smart

Today is Identity Management Day. With 79% of all organisations having experienced an identity related security breach, this is an issue that must be taken seriously.

Ukraine war is fast-tracking cyber laws

Thanks to Vlad “The Invader” Putin, the EU, UK and US are fast-tracking cyber laws. But some experts think the laws and regulations lack proper incentives beyond fines and prosecution.

Russian Cyber Warfare capabilities overblown

There is one thing we learned from the Ukraine war: the Russian army is not nearly as powerful as we believed it was. That goes for their cyberwarfare capabilities as well – find out why in our latest Crucial Tech podcast.

Video Bytes: Changing the Script on Cybersecurity Hiring Part 2

t two of our video series with Matt Donato, managing director of #cybersecurity hiring company CyberSN, looks at strategies for discovering and communicating the actual personnel need for a company.

How Visibility Improves Security

If you want to know which devices in your network are insecure, you need to know your devices, all of them. In our latest Interview, Zac Warren from Tanium argues that visibility is key in achieving good security.

Web Scraping: A Critical Tool For Threat Intelligence

Cyber threat intelligence is a vital strategy that prevents attacks, and web scraping is critical to its success.

Roblox Hack: don’t let cybercriminals blindside you

Last month, it was reported that Roblox – an online game creation platform – had suffered a data breach after one of its employees fell victim to a phishing attack. This resulted in 4GB of internal documents being stolen and

SysAdmins: The Unsung Heroes of the IT World

29th July is SysAdmin Day, designed to remind everyone of the hard work that SysAdmins do behind the scenes. Cyber Protection Magazine spoke to ten technology experts to hear why SysAdmins are so important, and how we can all better show our appreciation.

How to protect personal data with technology

Personal identity information (PII) is more vulnerable than ever, so securing it becomes more important. CPM gives an overview of current and future solutions.

The Security Standard to rule them all

Taken from our latest special issue, Alex Leadbeater, ETSI’s Chair of Cybersecurity discusses their IoT-Security standard