Dear Reader, 

Our irregular newsletter is going through a format change starting with this issue. We will still highlight stories published in the online magazine and our special issues, but we will be focused on what’s to come more than what was.

 The primary reason for this change is to manage the flood of ideas that come to us daily, and that we come up with as well. Rather than getting locked into an annual editorial calendar, we will have the freedom to change directions on the fly. So here’s our first tranche of subjects.

Enjoy reading!

Best regards

Patrick Boch & Lou Covey
Editors
 

The end of passwords

Apple made a big splash recently with the announcement of the “passkey” technology that will replace passwords and biometrics in their technology. This is not a new idea. There are multiple technologies on the market that eliminate the need for passwords. We’ll be looking at the pros and cons of all of them.

Password, qwerty, 123456: Leaving bad habits behind on World Password Day
It's World Password Day. If you're still using weak passwords or one password for all your online services - read this article to hear what some experts say and what…
Read more...

Cyber education opportunities

There is an ongoing debate whether there is actually a skills gap in cybersecurity. True or not, there are a lot of open jobs in the industry. there just don’t seem to be a lot of people lining ups for them because few people know what it takes to get those jobs. A niche industry within the cyber world is training and there are dozens of organizations dedicated to training and certification. We will be looking at this as an ongoing feature.

 

The Psychology Behind Cybersecurity
With seemingly no end to the growing problem of cyberattacks in sight, the cybersecurity industry is increasingly looking to address the root of the problem; humans.
Read more...

Benefits of diversity hiring

Cybersecurity may be the most diverse tech industry in the world. That doesn’t mean there is no room for improvement. There is still gender and racial bias. Something we have noticed, however, is the level of passion for the industry within the tanks of those most discriminated against, the kind of passion that makes them better employees and in turn, make more profitable and respected companies. We will look at how having a diverse workforce isn’t just the moral thing to do, it’s also good business.

Video Byte: Changing the Script on Cybersecurity Hiring
Finding sufficient human and technology resources to protect company data has reached a crisis point. We explore hiring strategies and tactics with Matt Donato, managing director of CyberSN, in this…
Read more...

HR special issue

 Following along with that idea, we are planning a special issue on human resources for this fall. we want to do a deep drill down to help HR departments understand what they need to be looking for and to set expectations for their companies accordingly.

Cyber Protection Magazine: Cloud Expo Issue
Our first printed special edition of Cyber Protection Magazine is here. This time the issue is not only available in digital form, a printed version is also available on the…
Read more...

Convergence of information operations and cyberattack

 On the anniversary of the Colonial Pipeline attack, Information operations remain some of the most vulnerable in infrastructure systems. Companies must integrate specialized information operations technology with their existing cyber threat platforms to create a consolidated attack surface for a 360-degree view of exposure.

Colonial Pipeline: One year on from the ransomware attack that shocked the world
One year ago Colonial Pipeline – the largest fuel pipeline in the US – suffered a ransomware attack. Cyber Protection Magazine speaks to three cybersecurity experts to learn what organisations…
Read more...

Crimes as old as time

 It’s a sad state of affairs, but there are, essentially, just five types of cyber attacks in the world… and people still don’t prepare for them. We’ll take a look at all five and what people and companies need to do.

Roblox hacking

 Roblox is one of the most popular online gaming systems in the world, but it is also incredibly vulnerable. If your children are hooked on this platform, you might want to keep an eye on what they are doing.

Stories to pay attention to:

RSAC 2022 — North Korean imposters posed an interesting conundrum for cyber experts at the RSA conference. We spoke to several of them.

Security Culture — Matthew Margetts from Smarter Technologies takes a look at Zero Trust as a philisopy, while Journalist Stephen Moramarco delves into the “Psychology of Cybersecurity” facing organizations trying to build awareness and good practices.

And that’s it for this issue of the Cyber Protection Magazine newsletter. If you have a comment, question or pitch on any of the above subjects. from us a line on the website, or a one-minute audio comment on the Crucial Tech podcast. If you are one of the lucky few with out business email, you can send it that way, too. We will get back to you.

Thanks for reading and if you liked our newsletter, please share it with friends and colleagues.

facebook  twitter  linkedin  youtube 
Cyber Protection Magazine
https://cyberprotection-magazine.com
Modify your subscription    |    View online