Skip to content
Cybersecurity Magazine

Cybersecurity Magazine

Science meets Practice

  • Topics
    • Expert Opinions
    • Internet of Things
    • Mobility and 5G
    • History of Hacking
    • Interviews
    • Security Basics
  • Videos
    • Videos
    • ETSI Security Conference 2022
  • Newsletter
  • Journals
  • About
    • Authors
    • Contact
    • Who we are
    • Partners
    • Submit
  • Expert Career Profiles
  • Cybersecurity Magazine Webinar

Three ways you can upgrade your cyber security to defend against phishing attacks
Frontpage special 

Three ways you can upgrade your cyber security to defend against phishing attacks

April 30, 2024 Steve Ross 0 Comments 3 min read
<strong>AI: Armageddon or auspicious new beginning? </strong>
Frontpage special 

AI: Armageddon or auspicious new beginning? 

April 25, 2024 Jamal Elemellas 0 Comments 4 min read
<strong>7 Social Media Phishing Scams to Watch Out For</strong>
Expert opinion Frontpage special 

7 Social Media Phishing Scams to Watch Out For

April 23, 2024April 23, 2024 Zac Amos 0 Comments 7 min read
DORA – Navigating the EU’s Operational Resilience Landscape
Frontpage special 

DORA – Navigating the EU’s Operational Resilience Landscape

April 18, 2024April 18, 2024 Editor's Desk 0 Comments 10 min read
Threat Intelligence Led Security Operations
Frontpage special 

Threat Intelligence Led Security Operations

April 10, 2024April 10, 2024 Tim Manley 0 Comments 9 min read

Interviews

Ransomware Threats and Data Protection Strategies
Expert opinion Frontpage special 

Ransomware Threats and Data Protection Strategies

April 4, 2024April 4, 2024 Editor's Desk 0 Comments 0 min read
Unlocking Security: A Deep Dive into Zero-Trust Architecture
Frontpage special 

Unlocking Security: A Deep Dive into Zero-Trust Architecture

February 20, 2024February 20, 2024 Editor's Desk 0 Comments 0 min read
CSM Editorial Podcast
Frontpage special 

CSM Editorial Podcast

December 20, 2023December 20, 2023 Editor's Desk 0 Comments 1 min read
ETSI Security Conference 2023: Exploring Zero Trust Architecture with Dr. Galina Pildush
Frontpage special 

ETSI Security Conference 2023: Exploring Zero Trust Architecture with Dr. Galina Pildush

December 12, 2023 Editor's Desk 0 Comments 6 min read
Load More

Expert Opinions

How The EU AI Act Will Impact US Companies
Frontpage special 

How The EU AI Act Will Impact US Companies

February 27, 2024February 27, 2024 Dominique Shelton Leipzig 0 Comments 13 min read
<strong>Driving Child Safety Using Large Language Models</strong>
Expert opinion Frontpage special 

Driving Child Safety Using Large Language Models

February 13, 2024February 13, 2024 Pranav Chaudhary 0 Comments 5 min read
A Guide to Affordable Cybersecurity Protection for Your Small Business
Expert opinion Frontpage special 

A Guide to Affordable Cybersecurity Protection for Your Small Business

February 6, 2024February 6, 2024 Ivana Zec 0 Comments 6 min read
<strong>How businesses can mitigate risks and uphold compliance in 2024</strong>
Frontpage special 

How businesses can mitigate risks and uphold compliance in 2024

January 12, 2024January 12, 2024 Tim Freestone 0 Comments 5 min read
Load More
<strong>World Backup Day – </strong><strong>is it time to take a step back on backups?</strong>
Expert opinion Frontpage special 

World Backup Day – is it time to take a step back on backups?

April 2, 2024April 2, 2024 Editor's Desk 0 Comments 6 min read
Cryptographic Solutions for Data Security in Cloud Computing
Frontpage special Journal Abstracts 

Cryptographic Solutions for Data Security in Cloud Computing

March 26, 2024March 26, 2024 Editor's Desk 0 Comments 1 min read
Confidential data should stay… confidential
Frontpage special 

Confidential data should stay… confidential

March 14, 2024March 17, 2024 Michael Rask Christensen 0 Comments 4 min read
Building Cyber Resilience: Key Trends and Strategies for a Secure Future
Frontpage special 

Building Cyber Resilience: Key Trends and Strategies for a Secure Future

March 12, 2024 Editor's Desk 0 Comments 0 min read
<strong>Why the Cloud Is So Vulnerable to Insider Threats</strong>
Frontpage special 

Why the Cloud Is So Vulnerable to Insider Threats

March 7, 2024March 7, 2024 Zac Amos 0 Comments 4 min read

Insider threats are becoming just as big of a threat to cloud security as external threats. Whether accidental or on

<strong>How can internet service providers </strong><strong>promote </strong><strong>online sa</strong><strong>fety?</strong>
Expert opinion Frontpage special 

How can internet service providers promote online safety?

March 5, 2024March 7, 2024 Guy Miller 0 Comments 2 min read
<strong>The evolving threat landscape in 2024: AI takes centre stage</strong>
Expert opinion Frontpage special 

The evolving threat landscape in 2024: AI takes centre stage

February 29, 2024February 29, 2024 Editor's Desk 0 Comments 5 min read
<strong>5 Cybersecurity Predictions </strong><strong>and Trends to Watch in </strong><strong>2024</strong>
Frontpage special 

5 Cybersecurity Predictions and Trends to Watch in 2024

February 22, 2024February 22, 2024 Editor's Desk 0 Comments 6 min read
<strong>Exploring How Vulnerability Puts You at Risk on Valentine’s Day</strong>
Expert opinion Frontpage special 

Exploring How Vulnerability Puts You at Risk on Valentine’s Day

February 15, 2024February 15, 2024 Paolo Passeri 0 Comments 3 min read
<strong>Be prepared: the 3 t</strong><strong>op cyberthreat</strong><strong>s</strong><strong> </strong><strong>for</strong><strong> </strong><strong>2024</strong>
Expert opinion Frontpage special 

Be prepared: the 3 top cyberthreats for 2024

February 8, 2024February 8, 2024 Darren Thomson 0 Comments 4 min read

In today’s fast-evolving cybersecurity environment, being aware of upcoming threats on the horizon is crucial for informing the preparations and actions that are needed

<strong>Best Practices for Implementing Threat Intelligence in Industrial Control Systems </strong>
Expert opinion Frontpage special 

Best Practices for Implementing Threat Intelligence in Industrial Control Systems 

February 1, 2024February 1, 2024 Emily Newton 0 Comments 6 min read

It has become clear industrial control systems (ICS) lack essential defenses. In the face of an ever-evolving threat landscape, cyber threat

ETSI Security Conference 2023: Mr. Alex Cadzow and the Regulatory Landscape of Cybersecurity
Frontpage special 

ETSI Security Conference 2023: Mr. Alex Cadzow and the Regulatory Landscape of Cybersecurity

January 30, 2024January 30, 2024 Editor's Desk 0 Comments 0 min read

ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, took place face-to-face from 16 to 19 October 2023, in ETSI, Sophia Antipolis, France, and gathered more

<strong>Is the cyber security sector unprepared for AI?</strong>
Frontpage special 

Is the cyber security sector unprepared for AI?

January 23, 2024January 23, 2024 Brian Martin 0 Comments 4 min read

Generative AI has taken the world by storm but there’s still some confusion over its applicability in a cyber security context

Cybersecurity Magazine

Latest Podcast

CSM Podcast: Journal of Cyber Security and Mobility Best Paper 2022
In our podcast this month, Cybersecurity Magazine talks to the author Roman V. Yampolskiy about the paper, the controllability of AI, and the future risks of AI.

Find all podcasts here

Media Partnerships/Events

ETSI Security Conference 2023

16-19 October 2023

Cybersecurity News

Newsletter

To subscribe to our newsletter, simply fill out the form below.

Read our archived Newsletter here.

  • About Cybersecurity Magazine
  • Newsletter
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy
Copyright © 2025 River Publishers.
All rights reserved.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT