IAM in a shifting environment

IAM in a shifting environment

The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM). Identity plays a pivotal role in all facets of business functions. Overseeing identity and access presents challenges in determining who should have access to what. This process requires a contextual understanding of the roles and duties of numerous individuals within an organization, ranging from system owners…

Boosting digital hygiene without technology

When they discuss issues in meetings, we all agree on a passphrase for whatever decision maker is chosen. It’s not shared in emails, texts, or phone conversations and only two or three people are authorized to use them.

grey metal chain on white background

A Guide to Understanding Vulnerability Reporting and Scoring

To understand the world of cybersecurity vulnerability scoring, there is no better place to start than defining the most commonly used  acronyms. This article explains CVE, CNA, KEV and CVSS.

smartphone, face, woman

Cybersecurity needs cyber deception: stay alert and be aware

To reduce the likelihood of attacks, businesses must focus on welcoming new ways of combating the creative tactics of cybercriminals. Cyber deception is one of the latest approaches that can detect and defend against malicious manoeuvres.

laptop, apple, macbook

Bridging the Gap: Empowering Women for a Stronger Cyber Security Future

This article will delve into why the cyber security industry urgently needs more women and how organizations can empower women to bridge the pervasive gender gap in this evolving sector.

We keep advertising at a minimum to maintain independence. That means we need support from our readers.

How about you buy us a coffee?

Special: What does 2022 hold in store?

What a year 2021. In terms of (successful) cyber attacks one of the most challenging years ever. Let’s just hope that headlines like that from the colonial pipeline or the florida water supply will not become more common in 2022.

More Predictions on Cybersecurity in 2022 – Part 3

Our next article on what’s in store for 2022 – we saw some spectacular attacks in 2021. Will the coming year be worse? Read what experts think is coming from the dark side of the internet.

Cybersecurity Predictions for 2022 – Part 2

We’re continuing our predictions for the world of cybersecurity in 2022 with focusing on the defensive side, i.e. what can companies do to protect against attacks.

5G Networks are on the Rise: Faraday Bags protect your electronic devices (with Video)

By now, most people have probably heard of 5G and the impact it will have. From a cybersecurity viewpoint, this upgrade of the IoT means devices are built less secure. This has raised concerns from many speculators, including military, governments. Cyber Protection Magazine interviews Dan DeBaun and Wilson Bautista about the technology they came up with to address these concerns.

Fortify your business: 5 practices for stellar cybersecurity

The human element remains the weakest link in cybersecurity. In our latest guest post, Oliver Noble lays out how security-oriented work culture is put into practice.

Make semiconductors secure… or else

Last week, the 58th Design Automation Conference (DAC) in San Francisco dropped a few hints that the semiconductor industry will finally consider making chips secure before manufacturing. However, not without kicking, screaming and complaining.

How Visibility Improves Security

If you want to know which devices in your network are insecure, you need to know your devices, all of them. In our latest Interview, Zac Warren from Tanium argues that visibility is key in achieving good security.

How Cybersecurity Businesses are Tackling the Ukraine War

The ongoing invasion of the Ukraine has raised concerns about an increase in cyber attacks around the world. We spoke with Morten Kjaersgaard, CEO of Helmdal Security, to give us his opinion on cyber attacks related to the Ukrain war and how it impacts global cybersecurity.

Guess what!? Today is World Backup Day

Backups will improve your resilience against cyber attacks. For today’s World Backup Day we have a special episode of our Crucial Tech podcast to highlight the importance of backing up your data.

Back it up: The basics of World Backup Day

It’s World Backup Day! To coincide with the day, Cyber Protection Magazine spoke to eight industry experts about the importance of backing up data and how to ensure that your backup is effective and can protect your data.

Video Byte: Changing the Script on Cybersecurity Hiring

Finding sufficient human and technology resources to protect company data has reached a crisis point. We explore hiring strategies and tactics with Matt Donato, managing director of CyberSN, in this latest Video Byte