Last updated on September 6th, 2022 at 07:37 am

 

Healthcare OT Facilities Remain Exposed as Industry Experiences Ransomware Attacks

Last year saw an alarming rise in cyber attacks against healthcare facilities. Experts fear that patients will be unable to receive critical care at a targeted facility without a holistic whole-facility cybersecurity approach.

 

The future of ransomware

How will ransomware evolve further and what can organizations do to prevent or at the very least mitigate ransomware attacks? An event where Cyber Protection Magazine participated had some suggestions.

  

Insurance industry using weak reasons to not pay

Payouts for ransomware are growing faster than the insurance industry can capitalize them. Premiums are rising and as a result coverage limits are dropping. Moreover, Insurance companies are using weak reasons to not pay claims. Here is what you can do.

 

Top Skills for Cybersecurity Professionals to Prepare for the Future of Work

The demand for cybersecurity experts is higher than ever before. That’s why it is so important to keep your resume up-to-date with relevant skills

Validate your OAS (Open API Specification) by simply uploading your Swagger file below.

OpenAPI/Swagger Scanner

+ Drag & Dropupto 4MBOr view sample
Talk with us about API Security

Welcome to Cyber Protection Magazine

The cyber security industry evolves at neck breaking speed. What is missing is a publication that keeps track of and explains the issues and evaluates the technology in terms the C-suite and business leaders can understand. This is Cyber Protection Magazine.

California grant program is a security nightmare

Government’s inability to protect citizen data resulted in at least $36 billion in cyber fraud this year. California may be getting ready to add to that total and setting up small businesses to be hit hard by hackers.

Data Protection Day: Schrems II: The SME dilemma

Data Protection Day is a time to remind organizations across all industries and sizes about the important of data protection. Lately we’ve seen a lot of regulations like the GDPR or Schrems II, all small steps towards a proper data protection to secure personal data and give the topic the deserved recognition.
With the ruling of the European Court of Justice in the Schrems II case, pressure is growing on small and medium-sized companies to re-evaluate their processes and procedures and adapt them to the regulations of the EU GDPR. Mareike Vogt, data protection expert at TÜV SÜD, takes a closer look at this current topic.

Podcast: The hackers won’t let you go. Time to go after them

In cooperation with our correspondent from SIlicon Valley, Lou Covey, Cybersecurity Magazine is pleased to now offer podcasts. In this episode, John Flory III, CISO for Harbor Networks, explains why it is necessary to go on offense with ransomware attacks.

Patience and persistence trump technology in SolarWinds attack

As soon as the SolarWinds breach hit the news, press releases started pouring out of the cyber security industry with claims that their products or services would have prevented the breach, but talking to people in the trenches, that is a dangerous claim to believe. The truth it, human error and intention can defeat any security protocol or technology. We talked to Matthew Rosenquist and Steve Hanna about the only way to deal with security: vigilance.

1 43 44 45 49