Skip to content
Cyber Protection Magazine

Cyber Protection Magazine

The online magazine for cybersecurity and data protection

  • Topics
    • Expert Opinions
    • Video Byte
    • Interviews
    • Security Basics
    • All Articles
  • Magazine
  • Newsletter
  • Podcast
  • Contact
  • About
    • Authors
    • Partners
    • Submit
    • Who we are
You are here:Home » Cloud computing

Cloud computing

How Criminals Attack the Building Blocks of the Internet

Chaim Peer

It’s not a surprise that cyber criminals have identified APIs as one of the most lucrative targets when it comes to retrieving sensitive information. Here are some ideas how to prevent API attacks.

Read more...

Ukraine war is fast-tracking cyber laws

Lou Covey

Thanks to Vlad “The Invader” Putin, the EU, UK and US are fast-tracking cyber laws. But some experts think the laws and regulations lack proper incentives beyond fines and prosecution.

Read more...

Video Byte: Cloud Security and Software Defined Perimeter

Editors Desk

In our latest video byte, we’re discussing Cloud Security with Don Boxley, Co-Founder of DH2i – and found an amazing analogy for cloud securit in the process.

Read more...

Cybersecurity opportunities abound… if you can find them

Lou Covey

The need for skilled workers in the cybersecurity industry is and has been at a critical level for a decade. And it isn’t going away anytime soon.

Read more...

Do you really know cloud security?

Michael Cichosz

Since the introduction of cloud computing it has been touted as a “more secure” option than local servers. As the number of data breaches in the cloud grow, however, that may no longer be the case. Just as in all cases of security failures, human error is at the core.

Read more...
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy


The views and opinions expressed on Cyber Protection Magazine are those of the authors and do not necessarily reflect the official policy or position of Cyber Protection Magazine. Any content provided by our bloggers or authors are of their opinion and are not intended to malign any club, organization, company, individual or anyone or anything.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT