Open Season – Why is less data being encrypted than ever before?
Cyber Protection Magazine
by Jon Fielding
2d ago
Encryption is a critical component of cybersecurity strategies. By making use of various algorithms to scramble data, encryption renders information unintelligible to anyone not authorised to access it.… The post Open Season – Why is less data being encrypted than ever before? appeared first on Cyber Protection Magazine ..read more
Visit website
GDPR and the need for Cyber Insurance in Europe
Cyber Protection Magazine
by Editors Desk
2d ago
GDPR, with its rigorous data protection standards and hefty fines for non-compliance, has heightened awareness about data privacy and reshaped the demand for cyber insurance. Cyber insurance offers a financial safety net that can help organisations mitigate the potentially devastating financial impacts of cyber incidents, including data breaches, ransomware attacks, and other forms of cybercrime. Organisations should consider cyber insurance as an integral component of their risk management strategy, particularly given the escalating landscape of cyber threats and regulatory requirements. This ..read more
Visit website
A lesson on election security from tea ladies
Cyber Protection Magazine
by Lou Covey
1w ago
Our current election season faces the same problems as in 2016 and 2020.… The post A lesson on election security from tea ladies appeared first on Cyber Protection Magazine ..read more
Visit website
Is Backup Still Relevant?
Cyber Protection Magazine
by Editors Desk
2w ago
The end of March marks World Backup Day, a day traditionally designed to raise awareness of the importance of backup and encourage best practices.… The post Is Backup Still Relevant? appeared first on Cyber Protection Magazine ..read more
Visit website
World Backup Day: 3-2-1, ready?
Cyber Protection Magazine
by Editors Desk
2w ago
It’s World Backup Day, as always at the End of March.… The post World Backup Day: 3-2-1, ready? appeared first on Cyber Protection Magazine ..read more
Visit website
Book Review: AI Doctor, take the money and run
Cyber Protection Magazine
by Lou Covey
3w ago
Book Review: AI Doctor: The Rise of Artificial Intelligence in Healthcare, by Ronald M. Razmi, MD —Published by John Wiley and Sons — Copyright 2024 VCs tend to throw money at every tech fad. Sometimes they win, but more often they lose (one winner in four is considered a good rate currently, with a 3x return on investment). The generative artificial intelligence tech is the latest darling. All an AI company founder has to do is stand on the side of Sand Hill Road with a sign saying “AI!” Investors will fling money at them out of their Teslas. From our position at Cyber Protection Magazine, th ..read more
Visit website
Data Security Posture Management (DSPM) Explained
Cyber Protection Magazine
by Editors Desk
1M ago
In 2022 Gartner (who else?) coined a new term: Data Security Posture Management (DSPM), a new, data-centric approach that gives security teams full visibility into cloud environments. Through DSPM, security teams can focus on securing the "crown jewels" of their data, not just the castle walls. This content is for members only. Visit the site and log in/register to read. The post Data Security Posture Management (DSPM) Explained appeared first on Cyber Protection Magazine ..read more
Visit website
Social media hangs itself in TikTok legislation
Cyber Protection Magazine
by Lou Covey
1M ago
The debate over the appropriateness of the Congressional action against TikTok can be debated for a long time and probably will until the Senate takes action—which could be weeks. What is less debatable is TikTok’s, and pretty much all of the social media industry’s contribution to the situation. In essence, social media has hung itself with its own lifeline. The industry has long embraced Section 230, a section of Title 47 of the United States Code that classifies them as part of the telecommunications industry. That particular law immunizes social media platforms and users from legal liabili ..read more
Visit website
Scam Bucket: Credit card fraud is inevitable
Cyber Protection Magazine
by Lou Covey
1M ago
You can do everything right, but credit card fraud is inevitable. In recent weeks, Cyber Protection Magazine has fielded calls and emails from people who have followed all the best-known techniques for securing banking, debit, and credit card information. That includes bank notifications every time the card is used, multi-factor authentication (MFA), biometrics, and limiting the use of a card for specific transactions. These readers still experienced unauthorized use of their payment cards How does that happen? The market for criminal use of legitimate credit cards is a well-known “secret.” Th ..read more
Visit website
Like Digital Cicadas, Cybercriminals Lie In Wait Before Unleashing Their Presence
Cyber Protection Magazine
by Lydia Zhang
1M ago
A curious parallel can be drawn between cybercriminals and the intriguing phenomenon of Cicadas. Akin to the periodic insects that emerge from the ground after years of dormancy, cybercriminals often resurface with renewed vigor, unleashing their disruptive activities on unsuspecting organizations. This content is for members only. Visit the site and log in/register to read. The post Like Digital Cicadas, Cybercriminals Lie In Wait Before Unleashing Their Presence appeared first on Cyber Protection Magazine ..read more
Visit website

Follow Cyber Protection Magazine on FeedSpot

Continue with Google
Continue with Apple
OR