Happy Anniversary GDPR: 5 years on, where do we stand?
Cyber Protection Magazine
by Editors Desk
1w ago
Five years have passed since the advent of GDPR regulations. EU regulators have been picking up on violations and issuing billions of euros in penalties for non-compliance and data breaches ever since, but society has changed, technology has developed, and new challenges have emerged within that time. On its five-year anniversary, business leaders are looking back on how GDPR has impacted the world and the challenges that leaders face today. Penalties and non-compliance Data authorities have been hot on the tails of corporations for non-compliance and data breaches over the years, issuing mass ..read more
Visit website
Mental Health Awareness Week 2023 – No more empty words
Cyber Protection Magazine
by Editors Desk
1w ago
Mental Health is not a new concept – one might look back and consider how far we as a society have come, rather than suppressing all conversations that suggest something might be wrong. However, this is not to say that everything is perfect; according to Mimecast, “more than half of cybersecurity professionals say their work negatively impacts their mental health”. As workloads increase and we all have to balance more, we’ve spoken to technology experts to ask how organisations can best support their colleagues during troubling times. ‘Unprecedented times’, all the time This decade has alread ..read more
Visit website
TikTok Analysis: the onus is on us
Cyber Protection Magazine
by Lou Covey
2w ago
TikTok is in the news again with the State of Montana legislating an absolute ban on the app even though the legislator has no idea how that can be accomplished. But after several weeks of research, Cyber Protection Magazine has found that TikTok is no more a threat to the security of a country than any other social media platform. Regarding personal use, subscribers must accept personal responsibility for the consequences of using it. The only viable approach to controlling social media security abuses is for corporations and governments to limit, if not ban social media use in the organizati ..read more
Visit website
The Double-Edged Sword of AI & Cybersecurity
Cyber Protection Magazine
by Matt Morris
2w ago
Microsoft recently announced a new AI chatbot designed to assist cybersecurity professionals in simplifying complexity and identifying malicious activity. The chatbot is set to help defenders catch what others miss by correlating and summarizing data at rapid speeds. The benefits of AI in cybersecurity are significant, as it has the power to improve automated security efforts and reduce human error. AI can analyze extensive amounts of data to detect patterns or abnormalities that could reveal a cyber-attack and can be trained to identify malware, suspicious network traffic, and vulnerable syst ..read more
Visit website
Anti-Ransomware Day – Probe, Protect, and Prevent
Cyber Protection Magazine
by Editors Desk
2w ago
Falling on the anniversary of the WannaCry ransomware attack, which impacted more than 60 NHS trusts in the UK, Anti-Ransomware Day is a stark reminder of the damage that cybercriminals can inflict on an organisation. Jasson Casey, Chief Technology Officer at Beyond Identity, reveals: “Of the UK businesses who identified a cyber attack in 2022, while ransomware only accounted for around one in five of all attacks, it was cited as the most significant threat.” The average downtime following a ransomware attack is 22 days, during which the organisation suffers from significant reputational and f ..read more
Visit website
Book Review: Data for All by John K. Thompson
Cyber Protection Magazine
by Lou Covey
3w ago
In our first book review ever, Chief Editor Lou Covey talks with data scientist John K. Thompson about his recent book, Data for All from Manning Publishers. The book lays out, in plain terms, the depth of information every corporation and government in the world is collecting on us without monetary recompense to users. The book can serve as a text for data science majors but is easy enough to understand that any literate person can understand the scope and consequences of this data collection and why changes need to be made. His proposal for organizations that profit off our data should pay u ..read more
Visit website
Here’s to a New Password-Less Day!
Cyber Protection Magazine
by Jasson Casey
1M ago
It’s the tenth anniversary of World Password Day which means that there’s going to be an avalanche of well-intentioned advice this week about how to make passwords more secure. The problem is that passwords are never going to be secure. No matter how long they are, or whatever characters they include, it won’t stop cybercriminals from either stealing passwords, or buying them on the dark web, and simply logging in to an account. It’s not clever or complex to do – and to make things worse there are 921 password attacks every second.  It’s easy to steal long passwords Just to be clear, ther ..read more
Visit website
World Password Day 2023: Simple Habits To Protect Your Data
Cyber Protection Magazine
by Editors Desk
1M ago
Every year, World Password Day reminds businesses that water-tight password security needs to be prioritised with the risk of cyber attacks ever-rising. ‘Pet-name’ passwords will no longer cut it. Instead, companies must take simple steps like educating staff and using new technologies to avoid serious data breaches. With that in mind, we spoke to security experts to get their insights into how professionals can protect their data from cybercriminals. Modern technologies protect your weakest link Creating a ‘strong’ password is no longer the only way to practise good cyber hygiene. There are f ..read more
Visit website
The Looming Identity Crisis
Cyber Protection Magazine
by Lou Covey
1M ago
The RSAC 2023 Keynote by Rohit Ghai, CEO of RSA Security Stated very simply, AI will cause us humans to be totally confused about our role in this world. We face a looming identity crisis. I think the humans in the identity control center will not be spared either. Today let’s talk about what this crisis specifically means for them. Identity tech has lived through 3 disruptive technology waves. The first was the internet wave. The hallmark of that time was connectivity. Everything was getting connected, and our sector secured those connections. The second: the mobile cloud wave. It was charact ..read more
Visit website
The Growing Problem of Shadow APIs
Cyber Protection Magazine
by Chaim Peer
1M ago
As the world becomes increasingly digital, organizations are making the transition from on-premises systems to cloud-based services. According to a report from McAfee, 97% of organizations worldwide are using some type of cloud service, making cloud adoption an essential aspect of modern business operations. With this rise in cloud adoption, there has been a corresponding increase in the use of APIs. APIs enable communication between different software applications and platforms, making them an integral component of the digital ecosystem. However, this rapid adoption of cloud services and APIs ..read more
Visit website

Follow Cyber Protection Magazine on Feedspot

Continue with Google
Continue with Apple
OR