The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM). Identity plays a pivotal role in all facets of business functions. Overseeing identity and access presents challenges in determining who should have access to what. This process requires a contextual understanding of the roles and duties of numerous individuals within an organization, ranging from system owners…
When they discuss issues in meetings, we all agree on a passphrase for whatever decision maker is chosen. It’s not shared in emails, texts, or phone conversations and only two or three people are authorized to use them.
To understand the world of cybersecurity vulnerability scoring, there is no better place to start than defining the most commonly used acronyms. This article explains CVE, CNA, KEV and CVSS.
To reduce the likelihood of attacks, businesses must focus on welcoming new ways of combating the creative tactics of cybercriminals. Cyber deception is one of the latest approaches that can detect and defend against malicious manoeuvres.
This article will delve into why the cyber security industry urgently needs more women and how organizations can empower women to bridge the pervasive gender gap in this evolving sector.
Read our archived Newsletters here.
The healthcare industry is a vulnerable target of cybercriminals, but not for the reasons most business sectors are. Between 80 and 90 percent of all cybercrime results from people not following basic cyber hygiene practices, but in healthcare criminals gain access to information through infrastructure weaknesses and the murky third-party agreements.
What a year 2021. In terms of (successful) cyber attacks one of the most challenging years ever. Let’s just hope that headlines like that from the colonial pipeline or the florida water supply will not become more common in 2022.
Our next article on what’s in store for 2022 – we saw some spectacular attacks in 2021. Will the coming year be worse? Read what experts think is coming from the dark side of the internet.
We’re continuing our predictions for the world of cybersecurity in 2022 with focusing on the defensive side, i.e. what can companies do to protect against attacks.
By now, most people have probably heard of 5G and the impact it will have. From a cybersecurity viewpoint, this upgrade of the IoT means devices are built less secure. This has raised concerns from many speculators, including military, governments. Cyber Protection Magazine interviews Dan DeBaun and Wilson Bautista about the technology they came up with to address these concerns.
The human element remains the weakest link in cybersecurity. In our latest guest post, Oliver Noble lays out how security-oriented work culture is put into practice.
Last week, the 58th Design Automation Conference (DAC) in San Francisco dropped a few hints that the semiconductor industry will finally consider making chips secure before manufacturing. However, not without kicking, screaming and complaining.
If you want to know which devices in your network are insecure, you need to know your devices, all of them. In our latest Interview, Zac Warren from Tanium argues that visibility is key in achieving good security.
The ongoing invasion of the Ukraine has raised concerns about an increase in cyber attacks around the world. We spoke with Morten Kjaersgaard, CEO of Helmdal Security, to give us his opinion on cyber attacks related to the Ukrain war and how it impacts global cybersecurity.
Backups will improve your resilience against cyber attacks. For today’s World Backup Day we have a special episode of our Crucial Tech podcast to highlight the importance of backing up your data.
It’s World Backup Day! To coincide with the day, Cyber Protection Magazine spoke to eight industry experts about the importance of backing up data and how to ensure that your backup is effective and can protect your data.
Finding sufficient human and technology resources to protect company data has reached a crisis point. We explore hiring strategies and tactics with Matt Donato, managing director of CyberSN, in this latest Video Byte