Protecting APIs: Our First Magazine is Out!
It’s here. We’re proud to announce the very first issue of Cyber Protection Magazine. This first issue is all about protecting the building blocks of a connected world: APIs
Read more...It’s here. We’re proud to announce the very first issue of Cyber Protection Magazine. This first issue is all about protecting the building blocks of a connected world: APIs
Read more...Organisations collect and store more data than ever before. However, this data is at greater risk than ever. For Data Protection Day 2022 we asked industry experts about their views on the state of data privacy.
Read more...How will ransomware evolve further and what can organizations do to prevent or at the very least mitigate ransomware attacks? An event where Cyber Protection Magazine participated had some suggestions.
Read more...The demand for cybersecurity experts is higher than ever before. That’s why it is so important to keep your resume up-to-date with relevant skills
Read more...Technology companies traditionally ignore the safety downsides of their products. Bluetooth tracking devices can surreptitiously shadow people. But it’s easy to disarm them.
Read more...Finishing up our series on 2022 predictions we went to some of the people we’ve talked to in the past year to get their views on what will influence chip security for the positive in 2022.
Read more...By now, most people have probably heard of 5G and the impact it will have. From a cybersecurity viewpoint, this upgrade of the IoT means devices are built less secure. This has raised concerns from many speculators, including military, governments. Cyber Protection Magazine interviews Dan DeBaun and Wilson Bautista about the technology they came up with to address these concerns.
Read more...The human element remains the weakest link in cybersecurity. In our latest guest post, Oliver Noble lays out how security-oriented work culture is put into practice.
Read more...The year is almost over – reason enough for us to take a look at what’s ahead. This is the first in a series of predictions from cybersecurity experts of what we can expect in 2022. But beware: Predictions are difficult, especially about the future!
Read more...Establishing consistency in security protocols is a challenge for any organization developing and implementing APIs. Judicious use of automation can mitigate development delays and facilitate development, as panel discussion showed.
Read more...