Skip to content
Cyber Protection Magazine
  • Topics
    • Expert Opinions
    • Video Byte
    • Interviews
    • Security Basics
    • All Articles
  • Magazine
  • Newsletter
  • Podcast
  • About
    • Contact
    • Partner
    • Authors
    • Why work with us?
    • Submit
    • Who we are
  • Log In/Register
You are here:Home » identity » Page 3
Photo of Person Pointing a Handgun

Tracking 2024’s top three cybersecurity threats

Darren Thomson February 9, 2024

From our predictions issue: As 2024 gets underway, here are three threats which promise to be making waves in the coming year.

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here
Read more...
round life buoy

Safer Internet Day: Cybersecurity Best Practices

Sean Richards February 6, 2024

Safer Internet Day aims to raise awareness among young people of online issues. But they’re not the only ones who need to be aware of online safety. Businesses are just as vulnerable to cyber threats if they don’t protect themselves appropriately. 

Free Membership Required

You must be a Free member to access this content.

Join Now

Already a member? Log in here
Read more...

Scam bucket: “Brushing” scams are hard to defend

Lou Covey February 6, 2024

“Brushing” scams are one of the rarer internet crimes and are hard to defend once started. They can range from relatively benign pranks to outright identity theft. Most commonly found on Amazon, they can occur on any e-commerce site that uses customer reviews to boost products.

Free Membership Required

You must be a Free member to access this content.

Join Now

Already a member? Log in here
Read more...

Our 2024 Predictions Issue is here

Editors Desk January 30, 2024

The heading says it all: Our latest issue, focusing on predictions for 2024, has finally arrived.

Read more...
Scam email message for Paxful Wallet scam

Scam Bucket: The Paxful Wallet/Venmo Scam

Lou Covey December 19, 2023

Ever heard of Paxful Wallet? If you’re one of the 3 million people who use it to buy, sell, and store cryptocurrency that answer is yes. Since that customer base represents less than one percent of the US population, probably not. Unless that is, you are one of the thousands more hit by the Paxful Wallet/Venmo Scam.

Read more...

Black Friday Fears: Beating Cybercriminals to the Bargains

Editors Desk November 24, 2023

Each year Black Friday grows in popularity, and Cyber Monday is now a key part of the sales weekend. But, this growth of popularity has sparked the interest of cybercriminals, who are also out to exploit the vast number of people online trying to bag a bargain.

Read more...
close-up photography of person lifting hands

Navigating an identify-based approach to data security

Stuart Hodkinson November 21, 2023

Today, everyone is trying to solve the problem of what happens when credentials are compromised, and a network is breached. The simplest approach is to minimise movement until security teams can resolve the incident.

Read more...
person standing near LED sign

The Hidden Hand of the Hacker Market

Thomas Caliendo November 9, 2023

Unprecedented trends of data breaches reflect a more fundamental shift in the underground criminal market. This article explores trends related to data breaches, the underlying factors driving these trends, and what to expect in the near future.

Read more...
text

Why Is Security Technology Not Working?

Wes Kussmaul November 2, 2023

Our author Wes Kussmaul argues that the failing security industry is not as nefarious as that may make seem. Its participants were set on their dysfunctional path years ago.

Read more...
Two Men Having Conversation Next to Desk in Building

The Big Cybersecurity Error Companies Make and Four Steps To Correct It

Jerry Derrick October 31, 2023

Staying ahead of complacency requires a multi-faceted approach— there are four steps organizations need to take.

Read more...
« Previous123456…9Next »
All Posts Loaded Load More
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy


The views and opinions expressed on Cyber Protection Magazine are those of the authors and do not necessarily reflect the official policy or position of Cyber Protection Magazine. Any content provided by our bloggers or authors are of their opinion and are not intended to malign any club, organization, company, individual or anyone or anything.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT