Featured

Founder Shield MD on Navigating Multi-Cloud Complexities

Founder Shield Managing Director Jonathan Selby talks strategies to navigating the complexities of multi-cloud set ups

Qodea CISO Explains How Cyber Threats Could Outrun Cost

Qodea CISO Business Manager Ed Russell explains how growth in sophistication and volume of attacks means current investment in defences falls short

Hacking & Malware

Nokia and NL-ix Deploy Europe’s Largest IXP-Based Anti-DDoS

This collaboration between Nokia and NL-ix is unprecedented both being Largest IXP-Based Anti-DDoS, but the first anti-DDoS solution deployed by an IXP

Network Security

Bridging the Gap: Examining the UK-US Data Bridge

The UK-US Data Bridge was created to replace EU data frameworks and allow the exchange of personal data whilst still adhering to agreed rules

Data Breaches

Hiddenlayer CSO Tells Why It Made an AI Security Council

Technology & AI

Cooperation Key Theme at Microsoft Endpoint Security Summit

Cyber Security

Interviews

View all
Featured

Janis Lasmanis

CISO at Evolution

CISO at Evolution Janis Lasmanis walks through the high stakes it deals with in defending online live casinos from falling prey to attacks

Read More

Sean Dyon

Director of Strategic Alliances at HID Global

Enhance enterprise security with passkeys, increasing workforce productivity and fortifying defences with HID

Read More
"FIDO is critical because it eliminates shared secrets such as passwords, which are often targeted by phishing attacks."
Sean Dyon
Director of Strategic Alliances at HID Global

Graham Thomson

CISO at Irwin Mitchell

Graham Thomson reveals the numerous challenges and opportunities keeping him up at night as CISO at UK-based legal powerhouse Irwin Mitchell

Read More

Vonny Gamot

Head of Sales EMEA at McAfee

Cyber Magazine sits down with Vonny Gamot, Head of Sales EMEA at McAfee to find out what one of the premiere antivirus software providers is focusing on.

Read More

Markus Küchler

Head of IT Security at Epiroc

Markus Kuchler, Head of IT Security at Epiroc, on how it is driving mining innovation and digital transformation with cutting-edge cybersecurity

Read More

Janis Lasmanis

CISO at Evolution

CISO at Evolution Janis Lasmanis walks through the high stakes it deals with in defending online live casinos from falling prey to attacks

Read More

Top 10

View all

Top 10: Cybersecurity Tips

As cyber threats evolve at breakneck speed, Cyber Magazine unpacks 10 critical strategies that every business must master

Top 10 Uses of Blockchain in Cybersecurity

With blockchain technology demonstrating strong cybersecurity applications, Cyber Magazine examines the Top 10 Blockchain cybersecurity uses you can deploy

Top 10 Antivirus Platforms

Hacking & Malware

Top 10 Blockchain Companies

Technology & AI

Cyber Security

View all

Why the UK is Listing Data Centres as Critical Cyber Assets

Being Western Europe's leader in number of Data Centres, the UK has decided to take steps to ensure they receive adequate protection from cyber threats

Why the UK is Listing Data Centres as Critical Cyber Assets

Trustwave Reveals the Financial Sector's Cyber Threats

Cybersecurity Conglomerate Reveals Threats Facing Consumers

Decoding the US' Most Misunderstood Data Security Terms

Major Insurers Urge State Support To Secure Cyber Risk

Network Security

View all

TCS and Google Cloud Join for Solution to Secure the Cloud

TCS partners with Google Cloud to launch a range of AI-powered cybersecurity solutions to help businesses secure their clouds against advanced threats

TCS and Google Cloud Join for Solution to Secure the Cloud

Palo Alto Networks Buy IBM's QRadar Assets in Win for SIEM

NIST Standardises IBM's Post-Quantum Cryptography Algorithms

I-GRIP: INTERPOL's Mechanism that Stopped a $42m BEC Fraud

Examining One of the Largest DDoS Attacks of the Year

Videos

View all
Featured

Claroty: protecting society with cyber-physical security

Simon Chassar, Chief Revenue Officer, Claroty, reflects on the last two years, the maturity landscape of those in industrial sectors and Industry 5.0

Cyber Security

HID: Powering Trusted Identities

Cyber Security

How Irwin Mitchell Developed a Robust Cybersecurity Strategy

Cyber Security

Betting on Security: How Evolution is Securing Online Gaming

Application Security

View all

Palo Alto Networks Integrates ChatGPT for Secure Gen AI Use

The integration builds upon Palo Alto Networks' AI Access Security and enables businesses to monitor AI application adoption and prevent data leaks

Trend Micro's Lewis Duke on Fighting AI-Powered Fake News

What ChatGPT Passing an Ethical Hacking Exam Means for Cyber

OT Security

View all

CrowdStrike Goes to Congress: What Will Come of the Hearing?

CrowdStrike will face a US Congressional hearing about what went caused the global IT outage in a testimonial that could shape future cyber legislation

CrowdStrike Goes to Congress: What Will Come of the Hearing?

Oasis: How Ticket Sellers can Avoid Disappointing Customers

Elastic's Massimo Merlo Talks Securing Academic AI Research

Dominic Trott: A Resilience-based Cyber Strategy is Needed

People Moves

Events

View all

International Cyber Expo 2024

International Cyber Expo is built for the community, by the community.

Register now

Tech & AI LIVE New York

Connecting Tech & AI Leaders across North America

Register now

Webinar: Are You Ready for AI-Enhanced Cyber Threats?

Join us for a 45-minute discussion on how to transform your SOC to eliminate siloes and gaps that invite threats.

Register now

Tech & AI LIVE: Gen AI

Connecting the world's Tech & AI leaders

Register now

Cloud & Infrastructure

View all

Red Hat’s Chris Jenkins on Upping Security with Containers

While containerisation has brought about automation efficiencies and new level of security, Red Hat’s Chris Jenkins warns of the new threats it has brought

Red Hat’s Chris Jenkins on Upping Security with Containers

Aon Points to Area Diversification as Cloud Risk Strategy

Commvault Integrates Industry Giants into Security Solutions

IT Outages and the Risks of a Cloud Oligopoly

Can Exposure Management Secure the Growing Attack Surface?

Tech & AI

View all

ManageEngine Reveal Why IT Staff Are Struggling to Apply AI

Although AI has the potential to transform the IT sector, many staff within it are struggling with its implementation

CrowdStrike & HPE: Unifying IT and Security for Secure AI

SolarWinds: IT Staff Dubious on Organisation's AI Readiness