Skip to content
Cybersecurity Magazine

Cybersecurity Magazine

Science meets Practice

  • Topics
    • Expert Opinions
    • Internet of Things
    • Mobility and 5G
    • History of Hacking
    • Interviews
    • Security Basics
  • Videos
    • Videos
    • ETSI Security Conference 2022
  • Newsletter
  • Journals
  • About
    • Authors
    • Contact
    • Who we are
    • Partners
    • Submit
  • Expert Career Profiles
  • Cybersecurity Magazine Webinar

Expert opinion

Expert opinion Frontpage special 

Inside job: How the cause of data breaches has shifted

January 18, 2024January 20, 2024 Jon Fielding 1656 Views 0 Comments 5 min read

Humans are often regarded as the weakest link in the security chain but it would appear attempts to mitigate the threat seem to be

Read more
Expert opinion Frontpage special 

Breaches happen. Stop the Blame Game, and Foster Transparency

January 17, 2024January 17, 2024 Matt Hillary 1234 Views 0 Comments expert. opinion 4 min read

No-one wants to suffer a data breach and the potential havoc it can wreak. Unfortunately, there is a strong tendency

Read more
Expert opinion 

Startling Intellectual Property Theft Insights Every CISO Should Know

January 9, 2024January 9, 2024 Anastasios Arampatzis 1648 Views 0 Comments expert. opinion 6 min read

In an era where information is as valuable as currency, intellectual property (IP) theft has emerged as a silent yet formidable threat

Read more
Expert opinion Frontpage special 

Hidden in Plain Sight: Open-Source Software Vulnerabilities

December 14, 2023December 14, 2023 Andy Swift 1425 Views 0 Comments 4 min read

Open-source software (OSS), software which has had its original source code made available for redistribution and adaptation, has become so

Read more
Expert opinion Frontpage special 

Why digital transformation needs more flexible security testing

December 7, 2023December 7, 2023 Chris Dickens 1351 Views 0 Comments Opinion 5 min read

Whether it’s a global enterprise redefining a business process using cloud computing and machine learning or a sole trader setting

Read more
Expert opinion Frontpage special 

Distributed Applications & Security

December 5, 2023 Tom Madsen 1433 Views 0 Comments basics, expert. opinion 7 min read

The advent of Cloud providers in a big way impacts the way we are developing new applications since in most

Read more
Expert opinion Frontpage special 

Why Harness the Full Potential of Zero-Trust Architecture to Secure OT Environments?

November 30, 2023 Emily Newton 1470 Views 0 Comments expert 8 min read

Zero-trust architecture is becoming popular because it is a more comprehensive cybersecurity framework than previous castle-and-moat models. Increasing internal threat

Read more
Expert opinion Frontpage special 

Fearful Festivities: How to stay cyber safe this festive season

November 27, 2023November 27, 2023 Gemma Carter 1394 Views 0 Comments attacks, phishing, zerotrust 7 min read

With Christmas Day being mere weeks away, jingle bells and debit cards will be tapping and tinkling for this year’s Black Friday sales. While online shopping offers

Read more
Expert opinion Frontpage special 

Data Loss Prevention Metrics: Measuring the Effectiveness of Your DLP Program

November 23, 2023November 23, 2023 Stefanie Shank 2312 Views 0 Comments 6 min read

Data Loss Prevention (DLP) programs have emerged as a crucial component of an organization’s cybersecurity strategy. However, implementing a DLP

Read more
Expert opinion Frontpage special 

User credentials are by far the best hack

November 14, 2023November 14, 2023 Egon Kando 1345 Views 0 Comments expert, expert. opinion 4 min read

Losing sight of the biggest cause of security breaches isn’t surprising when there are often more column inches in the

Read more
  • ← Previous
  • Next →

Latest Podcast

CSM Podcast: Journal of Cyber Security and Mobility Best Paper 2022
In our podcast this month, Cybersecurity Magazine talks to the author Roman V. Yampolskiy about the paper, the controllability of AI, and the future risks of AI.

Find all podcasts here

Media Partnerships/Events

ETSI Security Conference 2023

16-19 October 2023

Cybersecurity News

Newsletter

To subscribe to our newsletter, simply fill out the form below.

Read our archived Newsletter here.

  • About Cybersecurity Magazine
  • Newsletter
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy
Copyright © 2025 River Publishers.
All rights reserved.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT