Protecting APIs: Our First Magazine is Out!
It’s here. We’re proud to announce the very first issue of Cyber Protection Magazine. This first issue is all about protecting the building blocks of a connected world: APIs
Read more...It’s here. We’re proud to announce the very first issue of Cyber Protection Magazine. This first issue is all about protecting the building blocks of a connected world: APIs
Read more...Finishing up our series on 2022 predictions we went to some of the people we’ve talked to in the past year to get their views on what will influence chip security for the positive in 2022.
Read more...The year is almost over – reason enough for us to take a look at what’s ahead. This is the first in a series of predictions from cybersecurity experts of what we can expect in 2022. But beware: Predictions are difficult, especially about the future!
Read more...SASE, CASB, Zero Trust, SSE – confused yet by all the abbrevations and acryonyms? Cybersecurity ist a highly dynamic field, and even the analysts find it hard to keep up.
We asked Mike Schuricht, VP Products at Forcepoint, to shed some light on Security Service Edge and explains its relationship to SASE and some other cybersecurity abbreviations in this Video Byte.
A 17-year-old FBI report claimed that 80 per cent of data breaches originate internally. A recent report on Statista, demonstrates that the problem is much more nuanced.
Read more...One of the biggest barriers to cybersecurity could ironically be your own employees. Here are some strategies that you can try to involve your employees in your cybersecurity strategy.
Read more...October is coming to an end – and so is Cybersecurity Awareness Month. This year, we spoke to ten industry experts about staying #CyberSmart.
Read more...In the first executive event on API security, Sandy Carielli from Forrester focused on API security from a development perspective – read her conclusion in our exclusive coverage.
Read more...Smishing is the latest and growing version of phishing. In this case, it is using text messaging platforms to gather passwords and identities and deliver malware. Read more in our article and the latest Crucialtech podcast.
Read more...German Election: What do the parties have in plan for cybersecurity? #btw21
Read more...