Automotive security: Digital hijacking of cars is far from reality
In the past two decades, we have heard stories about how researchers have “discovered” security flaws in cars
‘
In the past two decades, we have heard stories about how researchers have “discovered” security flaws in cars
‘
Supply chains across industries continue to face challenges as we enter 2023, The sector has already been crippled and it has little room for additional burdens.
Read more...It’s that time of year for making predictions for the coming year and the team at Cyber Protection Magazine put out the call in early
Read more...The wave of DDoS attacks that flood the Internet daily made everyone aware of the relevance of tDDoS attacks. The question is how to properly protect yourself and what mistakes to avoid.
Read more...When Computer Security Day was started in 1988, few could have imagined just how vital cybersecurity would become.
Cyber Protection Magazine spoke to nine industry experts, to learn about the most important cybersecurity practices.
With Black Friday and Cyber Monday fast approaching, this weekend is gearing up to be the biggest e-commerce event of the year. But, with this popularity comes the increased interest of cybercrimminals who seek to take advantage of retail’s busiest time of the year.
Read more...Cyber-attacks, disrupted supply chains, cloud usage––in an increasingly volatile environment, the demands that must be met by IT security are growing rapidly. One of the leading cybersecurity standards, ISO 27001, has now updated their versions to reflect the dynamics in the cybersecurity industry.
Read more...Zero trust is a heavily used buzzword. It inspires confidence when it’s used by cyber security and technology experts to imply a completely secure technology environment that protects people, devices and applications – all of the time.
Read more...The recent US national security community memorandum on Cross-Sector Cybersecurity Performance Goals (CPG) addresses risks to the nation and individual entities. This is a starting point to ensure organizations are all starting on the same footing. CISA spells this out on the same page when they describe what the CPGs are.
Read more...After decades cybercrime moving faster than the rest of the world, there are indications we may be catching up to cybercriminals. This new trend is
Read more...