Google and the state of California have come to loggerheads over legislation designed to require Google to provide financial support for local journalism. Naturally, Google is fighting this with a PR and lobbying blitz. They and their allies may be missing the point. Whatever the outcome, it could have a profound impact on the democratic process. The legislation, The California Journalism Preservation Act (CJPA) has been wending its way through…
We have partnered with it-sa365, a printed issue of Cyber Protection Magazine will be distributed there. And you can be part of it!
Everybody is going to own their own data. I’m going to own my own data. You going to own your own data. Your mother, your brother, your aunt, your uncle… we’re all going to own our own data. Those companies are going to have to pay royalties or license fees to use that data to train their models. The world is going in the opposite way.
The need for knowledgeable people to safeguard our online environment has increased. In this context, women have become significant influences in cybersecurity.
Ransomware attacks have cost victims millions upon millions of dollars, and these attacks are increasing at an alarming rate. This article will explore effective strategies to prevent and recover from these ambushes.
Read our archived Newsletters here.
The healthcare industry is a vulnerable target of cybercriminals, but not for the reasons most business sectors are. Between 80 and 90 percent of all cybercrime results from people not following basic cyber hygiene practices, but in healthcare criminals gain access to information through infrastructure weaknesses and the murky third-party agreements.
In today’s world, data is stored and processed across a broad range of locations. That can lead to issues with data governance, says Michael Queenan from Nephos Technologies.
Biometrics is a hub for personal security, identity theft and government surveillance. Protecting that stuff is kind of important. One way to do that is by decentralizing it.
It’s here. We’re proud to announce the very first issue of Cyber Protection Magazine. This first issue is all about protecting the building blocks of a connected world: APIs
With the Data Privacy Day and the data privacy week, the end of January has a particular focus on protecting data. In our special on data privacy, read expert commentary, but also useful knowledge about how your personal data is being used – data collection is not always evil.
Organisations collect and store more data than ever before. However, this data is at greater risk than ever. For Data Protection Day 2022 we asked industry experts about their views on the state of data privacy.
Personal data isn’t just about your name, it’s also about your online habits. Collecting that data sometimes seems creepy, but it can protect you from fraud, too.
One year ago Colonial Pipeline – the largest fuel pipeline in the US – suffered a ransomware attack. Cyber Protection Magazine speaks to three cybersecurity experts to learn what organisations can still do to prevent themselves from becoming the next victim.
The Arqit shareholder fraud lawsuit is pulling back the curtain on the Quantum computing industry. Before it’s over we may see how much is FUD, snake oil and legitimate.
Cyberattacks have become so prominent in the industry that organizations are now realising the need to have special task forces to stop such occurrences. But the truth is they are inevitable.
Our first printed special edition of Cyber Protection Magazine is here. This time the issue is not only available in digital form, a printed version is also available on the Cloud Expo Europe in Frankfurt. Consequently, we have a few topics we discuss in this issue.
Cybersecurity is a mystery to most people and organizations and the industry isn’t very helpful in clearing that up. Zero Trust (ZT) is a good first step but it, too, is a black hole of confusing information. But there are some individuals that are blazing a trail to ZT.