How to stop ransomware in its tracks
Cyber Protection Magazine
by Editors Desk
18h ago
Even seven years on, the name WannaCry still invokes memories of chaos and disaster amongst anyone in the technology world (and many more outside of it, too).… The post How to stop ransomware in its tracks appeared first on Cyber Protection Magazine ..read more
Visit website
How Do You Insure an Unpredictable Risk?
Cyber Protection Magazine
by Dr. James Norrie
4d ago
From our Cyber Insurance Issue: In today’s interconnected digital world, there is no such thing as an “unconnected” business.   That means for most that the extent of their online exposure will include running a calculated risk of becoming the victim of a cyber-attack because that event risk can never be zero. Or does i This content is for members only. Visit the site and log in/register to read. The post How Do You Insure an Unpredictable Risk? appeared first on Cyber Protection Magazine ..read more
Visit website
Third-party security is almost impossible
Cyber Protection Magazine
by Lou Covey
1w ago
There are many themes arising for the RSA Conference next week including tools and services to protect against originating with unsecured third parties in the supply chain. That is a crucial issue in every industry especially with almost every company doing business with a supplier in the cloud. But the scope of the problem is almost impossible to resolve. The reasons are myriad. With every Fortune 1000 business and government agency doing business with tens of thousands of third-party suppliers, the odds of finding one chink in the security protocols are very good for the criminals and state ..read more
Visit website
Passwordless Instead of Password Security
Cyber Protection Magazine
by Editors Desk
1w ago
In 2013, Intel launched World Password Day to raise general awareness of the relevance of secure username/password combinations in everyday digital life – with limited success.… The post Passwordless Instead of Password Security appeared first on Cyber Protection Magazine ..read more
Visit website
Ethics in AI should not be an afterthought
Cyber Protection Magazine
by Scott Allendevaux,
1w ago
Ethics in AI is an afterthought in development, making adoption a risky proposition. New industry standards, such as ISO/IEC 42001, and rigorous testing for generative AI models, guided by established ethical principles in AI management, can ease apprehension surrounding the advancement of this truly transformative technology. Huge hazards and pitfalls loom in AI adoption without adequate safeguards and guardrails. There’s potential for perpetuating stereotypes, spreading misinformation, advancing hate speech, hallucinating, exposing private data, and unforeseen harm. The potent ..read more
Visit website
Google at loggerheads over support for journalism
Cyber Protection Magazine
by Lou Covey
2w ago
Google and the state of California have come to loggerheads over legislation designed to require Google to provide financial support for local journalism. Naturally, Google is fighting this with a PR and lobbying blitz. They and their allies may be missing the point. Whatever the outcome, it could have a profound impact on the democratic process. The legislation, The California Journalism Preservation Act (CJPA) has been wending its way through the California legislation for about a year. The text of the law says, "This bill … would require … a covered platform (as in Google) to remit a … paym ..read more
Visit website
Commentary: Getting the point of Google News v. the media
Cyber Protection Magazine
by Lou Covey
2w ago
Cyber Protection Magazine posted a long article about Google’s decision to start de-listing California-based newspapers.… The post Commentary: Getting the point of Google News v. the media appeared first on Cyber Protection Magazine ..read more
Visit website
The Dynamic Duo – Why Modern Businesses Need the CIO and CISO to Collaborate
Cyber Protection Magazine
by Javier Dominguez
2w ago
For any cybersecurity or data protection strategy to succeed, organisations need to rely on strong internal collaboration and communication processes. In particular, the CIO/CISO dynamic can have a significant impact on both short- and long-term decision making, from strategic investment decisions to leading the response to security incidents. This content is for members only. Visit the site and log in/register to read. The post The Dynamic Duo – Why Modern Businesses Need the CIO and CISO to Collaborate appeared first on Cyber Protection Magazine ..read more
Visit website
IAM in a shifting environment
Cyber Protection Magazine
by Apu Pavithran
3w ago
The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM).… The post IAM in a shifting environment appeared first on Cyber Protection Magazine ..read more
Visit website
Open Season – Why is less data being encrypted than ever before?
Cyber Protection Magazine
by Jon Fielding
3w ago
Encryption is a critical component of cybersecurity strategies. By making use of various algorithms to scramble data, encryption renders information unintelligible to anyone not authorised to access it.… The post Open Season – Why is less data being encrypted than ever before? appeared first on Cyber Protection Magazine ..read more
Visit website

Follow Cyber Protection Magazine on FeedSpot

Continue with Google
Continue with Apple
OR