Skip to content
Cybersecurity Magazine

Cybersecurity Magazine

Science meets Practice

  • Topics
    • Expert Opinions
    • Internet of Things
    • Mobility and 5G
    • History of Hacking
    • Interviews
    • Security Basics
  • Videos
    • Videos
    • ETSI Security Conference 2022
  • Newsletter
  • Journals
  • About
    • Authors
    • Contact
    • Who we are
    • Partners
    • Submit
  • Expert Career Profiles
  • Cybersecurity Magazine Webinar

Frontpage special

Frontpage special 

Why the Cloud Is So Vulnerable to Insider Threats

March 7, 2024March 7, 2024 Zac Amos 1350 Views 0 Comments 4 min read

Insider threats are becoming just as big of a threat to cloud security as external threats. Whether accidental or on

Read more
Expert opinion Frontpage special 

How can internet service providers promote online safety?

March 5, 2024March 7, 2024 Guy Miller 1003 Views 0 Comments 2 min read

When it comes to internet safety, we all know the dangers of choosing ‘123456’ as a password or clicking links from unrecognised senders. But with online scams becoming increasingly sophisticated, internet

Read more
Expert opinion Frontpage special 

The evolving threat landscape in 2024: AI takes centre stage

February 29, 2024February 29, 2024 Editor's Desk 1459 Views 0 Comments 5 min read

In 2023, we saw the increasing adoption of AI in both offensive and defensive cybersecurity strategies. In 2024, AI-driven threat actors will become more sophisticated, and organisations will dedicate

Read more
Frontpage special 

How The EU AI Act Will Impact US Companies

February 27, 2024February 27, 2024 Dominique Shelton Leipzig 1327 Views 0 Comments expert 13 min read

I am excited for 2024 and the changes it will bring for U.S. Companies!  The EU AI Act, litigation trends

Read more
Frontpage special 

5 Cybersecurity Predictions and Trends to Watch in 2024

February 22, 2024February 22, 2024 Editor's Desk 1254 Views 0 Comments 6 min read

Radware’s cybersecurity experts offer insights into the 2024 threat landscape. From the profound influence of AI and the intricacies of

Read more
Frontpage special 

Unlocking Security: A Deep Dive into Zero-Trust Architecture

February 20, 2024February 20, 2024 Editor's Desk 1231 Views 0 Comments Interview 0 min read

Tom Madsen’s upcoming book, “Zero-trust – An Introduction,” offers readers a comprehensive guide to implementing and managing a zero-trust architecture

Read more
Expert opinion Frontpage special 

Exploring How Vulnerability Puts You at Risk on Valentine’s Day

February 15, 2024February 15, 2024 Paolo Passeri 1210 Views 0 Comments 3 min read

According to Netskope’s latest “Year in Review” Cloud and Threat Report, social engineering was the primary method cyber attackers utilized to infiltrate organizations

Read more
Expert opinion Frontpage special 

Driving Child Safety Using Large Language Models

February 13, 2024February 13, 2024 Pranav Chaudhary 3340 Views 0 Comments expert 5 min read

With the rise of the internet, more and more users are connected. It has become difficult to identify the intended

Read more
Expert opinion Frontpage special 

Be prepared: the 3 top cyberthreats for 2024

February 8, 2024February 8, 2024 Darren Thomson 1620 Views 0 Comments expert. opinion 4 min read

In today’s fast-evolving cybersecurity environment, being aware of upcoming threats on the horizon is crucial for informing the preparations and actions that are needed

Read more
Expert opinion Frontpage special 

A Guide to Affordable Cybersecurity Protection for Your Small Business

February 6, 2024February 6, 2024 Ivana Zec 1374 Views 0 Comments expert 6 min read

There exists an age-old battle between the two sides of the software development industry. On one, there are the white

Read more
  • ← Previous
  • Next →

Latest Podcast

CSM Podcast: Journal of Cyber Security and Mobility Best Paper 2022
In our podcast this month, Cybersecurity Magazine talks to the author Roman V. Yampolskiy about the paper, the controllability of AI, and the future risks of AI.

Find all podcasts here

Media Partnerships/Events

ETSI Security Conference 2023

16-19 October 2023

Cybersecurity News

Newsletter

To subscribe to our newsletter, simply fill out the form below.

Read our archived Newsletter here.

  • About Cybersecurity Magazine
  • Newsletter
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy
Copyright © 2025 River Publishers.
All rights reserved.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT