Skip to content
Cybersecurity Magazine

Cybersecurity Magazine

Science meets Practice

  • Topics
    • Expert Opinions
    • Internet of Things
    • Mobility and 5G
    • History of Hacking
    • Interviews
    • Security Basics
  • Videos
    • Videos
    • ETSI Security Conference 2022
  • Newsletter
  • Journals
  • About
    • Authors
    • Contact
    • Who we are
    • Partners
    • Submit
  • Expert Career Profiles
  • Cybersecurity Magazine Webinar

General

General 

Bank Heister Returns – Cyber, SWIFT tricker

May 2, 2019November 7, 2023 Mayur Dave 2540 Views 0 Comments expert 3 min read

Years ago, we have had incidents of bank robberies. And in the recent months, we still have incidents of bank

Read more
General 

Nature as an inspiration for the next-generation network defences

April 30, 2019May 13, 2019 Wojciech Mazurczyk 2701 Views 0 Comments expert 3 min read

The growing number, complexity, and diversity of network attacks as well as sophistication of modern malicious software and tools used

Read more
General 

Can you normalize the light in your office room? or: Why the fight against information hiding must be put onto a broader footing

April 29, 2019May 13, 2019 Jörg Keller 1666 Views 0 Comments expert 2 min read

Information hiding denotes the placement of secret information within innocent information, to hide the very existence of secret communication [4].

Read more
General 

Cyber Security Threats – Past|Present|Future

April 29, 2019May 13, 2019 Ravikumar Jeevarathinam 2513 Views 0 Comments basics, expert 4 min read

The world is being digitised at an accelerated pace. Technology adoptation and automation have become the new normal due to

Read more
General 

Cloud Security for Everyone

April 29, 2019May 13, 2019 Edward Amoroso 2244 Views 0 Comments cloud, expert 3 min read

Thirty years ago, a little wooden hut sat in the parking lot of my local Jersey strip mall. I would

Read more
General Internet of Things 

IoT in home

April 29, 2019June 6, 2019 Sander de Kievit and Andre Smulders 3029 Views 0 Comments expert, IoT 10 min read

Without doubt, internet of things will transform our life in the coming years. We will connect more and more devices

Read more
  • Next →

Latest Podcast

CSM Podcast: Journal of Cyber Security and Mobility Best Paper 2022
In our podcast this month, Cybersecurity Magazine talks to the author Roman V. Yampolskiy about the paper, the controllability of AI, and the future risks of AI.

Find all podcasts here

Media Partnerships/Events

ETSI Security Conference 2023

16-19 October 2023

Cybersecurity News

Newsletter

To subscribe to our newsletter, simply fill out the form below.

Read our archived Newsletter here.

  • About Cybersecurity Magazine
  • Newsletter
  • Contact us
  • Advertising
  • Submit
  • Imprint
  • Privacy Policy
Copyright © 2025 River Publishers.
All rights reserved.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT