Cybersecurity Magazine

Cybersecurity Magazine Science meets Practice

  • The Road to Provable Assurance: Automotive Cybersecurity in the Era of ISO/SAE 21434
    by Caroline Guillaume on August 21, 2025 at 11:25 am

    Navigating the Evolving Automotive Cybersecurity Landscape The automotive world is transforming at breakneck speed. We’re seeing increasing connectivity, the rise of autonomous driving, and the emergence of software-defined vehicles. This evolution places cybersecurity front and center, not as an afterthought, but as a fundamental requirement. The name of the game is proactive security. It’s no The post The Road to Provable Assurance: Automotive Cybersecurity in the Era of ISO/SAE 21434 first appeared on Cybersecurity Magazine.

  • Time-Tested Tools for New Tech Resilience: Risk-Based IT Audits
    by Srikanth Ambatipudi on August 19, 2025 at 3:18 pm

    ​Every organization continually faces vulnerabilities due to changes to existing IT systems and the introduction of new technologies. The IT internal audit department is tasked with providing independent assurance to organizational leaders that sufficient internal controls are in place and operating effectively. This department conducts periodic risk assessments to identify business processes and their associated The post Time-Tested Tools for New Tech Resilience: Risk-Based IT Audits first appeared on Cybersecurity Magazine.

  • What is IEC 62443: A Cybersecurity Guide for Industrial Systems
    by Tom Madsen on August 15, 2025 at 5:09 pm

    Introduction This is the first article in a series, introducing the IEC 62443 standard to those interested in cybersecurity for industrial infrastructures. This first one will be looking at the IEC 62443 standard in general, with later articles looking into some of the individual documents in more detail. My goal with this series, is to The post What is IEC 62443: A Cybersecurity Guide for Industrial Systems first appeared on Cybersecurity Magazine.

  • Why an Effective Detection and Response Strategy Must Focus on Very Attacked People (VAPs)
    by Joel Duffield on August 9, 2025 at 12:18 am

    When a business is considering its vulnerabilities and turns to consider which of its people might pose the most of a risk, it’s likely their first thought is the C-Suite or the Head of IT. But it’s not always the boardroom that ranks as VIP status in the world of cyber-targeting. Gaining unauthorised access into The post Why an Effective Detection and Response Strategy Must Focus on Very Attacked People (VAPs) first appeared on Cybersecurity Magazine.

  • Artificial Intelligence in Action w/ prof. Ahmed Banafa
    by Editor's Desk on August 5, 2025 at 1:04 am

    We spoke with Prof. Ahmed Banafa from San Jose State University about his latest work, Artificial Intelligence in Action: Real-World Applications and Innovations. In this discussion, he explores some of the most pressing questions in AI today—from the challenges of teaching generative AI and the realities of AI hallucinations, to the emerging concept of Green The post Artificial Intelligence in Action w/ prof. Ahmed Banafa first appeared on Cybersecurity Magazine.

  • The Role of Adaptive Learning in Continuous Vendor Monitoring
    by Emy Emmanuel on August 1, 2025 at 2:55 pm

    In today’s hyper-connected digital landscape, third-party vendors are integral to business operations. From cloud services and HR platforms to payment processors and legal consultants. Organizations rely heavily on external providers. However, this reliance brings a significant challenge: vendor risk—and not just for third parties, but for fourth and fifth parties down the chain. Traditional risk The post The Role of Adaptive Learning in Continuous Vendor Monitoring first appeared on Cybersecurity Magazine.

  • Why business logic abuse is a major threat
    by Mohammad Ismail on July 28, 2025 at 6:58 pm

    Earlier this year one of the largest ever cases of business logic abuse was detected when a botnet across over 11 million unique IP addresses was used against the login Application Programming Interfaces (APIs) of a Fortune 500 hospitality provider based here in the UK. The attackers sought to use credential stuffing to identify valid The post Why business logic abuse is a major threat first appeared on Cybersecurity Magazine.

  • Minimum Viable Company: A Practical Blueprint for Modern Cyber Resilience
    by Darren Thomson on July 21, 2025 at 12:59 pm

    In today’s digital economy, resilience is no longer just a technical requirement – it is a strategic imperative. As recent headlines show, cyberattacks are becoming more frequent, more sophisticated, and more damaging, and organisations need to think beyond conventional recovery models. According to recent research, nearly 4,000 cyberattacks occur globally every day, with ransomware striking The post Minimum Viable Company: A Practical Blueprint for Modern Cyber Resilience first appeared on Cybersecurity Magazine.

  • Cyber Chaos in the Digital Era
    by Abdelkader Keddari, Glenn Akester and Shobhit Gautam on July 17, 2025 at 5:43 pm

    In recent months, some of the UK’s most recognisable retailers, including M&S, Co-op and North Face have found themselves in the cybersecurity spotlight, for all the wrong reasons. The harsh truth remains that the security strategies many retailers are relying on are outdated and unfit for purpose in the current digital landscape of relentless cyber The post Cyber Chaos in the Digital Era first appeared on Cybersecurity Magazine.

  • Shadow AI: The hidden risk in AI adoption
    by Steve Durbin on July 11, 2025 at 11:11 pm

    AI is undoubtedly a game-changer. According to a McKinsey survey,78% of respondents deploy AI in at least one business process, a jump from 55% in 2023. For knowledge workers, AI saves time, makes work easier, and boosts productivity. Many (46%) of these workers would not give it up if prohibited. However, if employees use AI The post Shadow AI: The hidden risk in AI adoption first appeared on Cybersecurity Magazine.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.