Dear Reader, 

As 2021 comes to a close we are celebrating the completion of our first year at Cyber Protection Magazine. It’s been quite a ride. And looking at the log4j vulnerability which set the internet on fire over the past weekend, that ride is far from over.

We’ve grown our audience completely organically and reach more than 10,000 people across all channels, lay and professional around the world and are looking for an even better year in 2022. What we can promise: there are some changes and a lot of new stuff to look forward to.
Thanks to all of our readers and listeners that have made it possible.

In our last, irregular, newsletter of the year we are looking over some of the best content of the past quarter, plus some things from other sources you may have missed.

Enjoy reading!

Best regards

Patrick Boch & Lou Covey
Editors

Log4Shell

Of course, when sending out a newsletter this week, we have to refer to the log4j vulnerability. Some say that this is the biggest cybersecurity news of the decade. Their memory might be shortlived, looking at the Exchange Server vulnerability from earlier this year - and, just to mention: the decade has just begun.

log4j: What You Need To Do now
The internet is on fire. Quite literally, ever since news about a vulnerability in log4j. Here's what to do now.
Read more...

Making security holistic

We talked with the founder of Upheaval. about using blockchain technology and the CEO of the security research firm ValidDatum, to create a truly holistic approach to security in Myths, statistics and holistic security.

The world of cybersecurity is filled with conflicting statistics, based on outdated data, infused into marketing material promoting products. The term, holistic, is applied to products and services that approach security not just from outside a network but within. It might not be a bad idea.

Myths, statistics and holistic security - are insiders the real problem?
A 17-year-old FBI report claimed that 80 per cent of data breaches originate internally. A recent report on Statista, demonstrates that the problem is much more nuanced.
Read more...
Upheaval's Ironweave might actually fix data security with blockchain
It is a rare thing when a company is actually solving a significant problem with their product. Did we finally find a company which solves the problem of data security?…
Read more...

Free? Free is good

 We interviewed the CEO of Fletch.ai in our continuing mission of finding the holy grail of cybersecurity. The company which finds threats within your network and outside, using artificial intelligence and machine learning. The CEO, showed us a demo of their product and our whole team immediately asked whether we can use it.

Video Interview: Finding Threats within your network - for free
As our quest for the holy grail of cybersecurity continues, we made a discovery which could be helpful for a lot of businesses. Watch our latest video with fletch.ai
Read more...
Fletch provides an early Christmas gift
A few weeks ago we did a video demonstration of the Fletch.ai on the Cyber Protection Magazine Youtube channel, but wanted to share the audio portion in this week's podcast…
Read more...

 

API growth is explosive, make sure it doesn’t blow up your business

We partnered with Imvision on a seminar series dedicated to successful approaches to API security.  The growth of application programming interfaces (APIs) is exploding. Today, smaller applications exchange information and data using APIs, leading to increased complexity, much of which is invisible to the user.

Automation promotes consistency in API security
Establishing consistency in security protocols is a challenge for any organization developing and implementing APIs. Judicious use of automation can mitigate development delays and facilitate development, as panel discussion showed.
Read more...
Building a collaborative security team: Case Study
Solving cybersecurity issues can boil down to a single weakness: personnel, but hiring qualified security workers is hard when you don’t know what skills are needed. Building from within with…
Read more...

Have a secure Christmas

On our podcast, Crucial Tech, we got a chance to review the Mozilla Foundation list of creepy products you might want to avoid, and those that are not creepy at all. The fifth annual Privacy Not Included list tis published annually and if you are thinking of buying some electronics as gifts or for yourself, you can find the list here. We took that list a bit further with our own analysis talking with cyber leaders.

Mozilla wants to show you where "Privacy is Not Included"
e interviewed Jen Caltrider of the Mozilla Foundation about the fifth annual Privacy Not Included list the foundation publishes annually and if you are thinking of buying some electronics as…
Read more...

Bitlocker bites it

Our friends at Digistor asked the question “Is BitLocker Sufficient?” Unfortunately, BitLocker and security concerns go hand-in-hand. Known flaws have been addressed, but it has to be acknowledged that hackers regularly — and successfully— attack BitLocker.

Thanks for reading and if you liked our newsletter, please share it with friends and colleagues.

facebook  twitter  linkedin  youtube 
Cyber Protection Magazine
https://cyberprotection-magazine.com
Modify your subscription    |    View online