Cyber Protection Magazine The online magazine for cybersecurity and data protection
- Tackling Fraud Abuse in the Era of Generative AI & Global Accessby Tamás Kádár on November 25, 2025 at 9:48 am
criminals are exploiting GenAI to scale fraud like never before, using AI-generated text, images and videos, deepfakes, synthetic identities and other manipulations to deceive systems and victims alike. The post Tackling Fraud Abuse in the Era of Generative AI & Global Access appeared first on Cyber Protection Magazine.
- Defining Dysinformationby Lou Covey on November 20, 2025 at 8:58 pm
Dysinformation is a scourge of society, fueled by social media and malicious actors, but you may not have heard the term spelled this way. Dysinformation simply means “damaging information.” It puts misinformation and disinformation in the same bucket, but what is the difference? Disinformation Disinformation is intentional. The authors know it is false and distribute it with the desire to defraud, destabilize and delegitimize issues and individuals. It is often defended as, “Hey, I’m just asking questions.” The first recorded instance of disinformation occurs in Genesis. After Eve explains to the serpent why she should not eat forbidden fruit, the serpent replies “Has God really said…?” Disinformation authors do not need to prove an allegation. They just need to get a small credulous audience to wonder if what they say is true. If the allegation reflects a particular opinion of the audience, they are more likely to accept the allegation as true. Every piece of disinformation may contain an element of truth to establish the author’s qualifications, but the majority is sheer speculation. The post Defining Dysinformation appeared first on Cyber Protection Magazine.
- Securing Identity in a Digital Age: Why Advanced Verification Matters for the U.S.by Steve Yonkers on November 20, 2025 at 9:42 am
Identity fraud remains one of the most persistent threats facing governments, industries, and individuals alike. This reality has prompted ongoing enhancements in identity security The post Securing Identity in a Digital Age: Why Advanced Verification Matters for the U.S. appeared first on Cyber Protection Magazine.
- AI Governance Challenges That Can Prevent Shadow AI And Misuseby Michael Cichosz on November 18, 2025 at 6:07 am
Artificial Intelligence (AI) technologies are being widely adopted in across industries and are likely to bring disruptive benefits as well as challenging governance issues. Among such concerns is the escalation of Shadow AI The post AI Governance Challenges That Can Prevent Shadow AI And Misuse appeared first on Cyber Protection Magazine.
- Is cyber training worth the effort?by Lou Covey on November 13, 2025 at 6:32 am
There has been a debate within the cybersecurity industry regarding cyber training effectiveness. On one side are tool providers who claim technology trumps training in securing data, networks, and people. On the other side is the $10-billion cyber training industry, growing at 20 percent per year. That says they must be doing something right. The real answer is not black and white. The naysayers point to a recent study done by UC San Diego of its own employee training program. The study said, “Cybersecurity training programs as implemented today by most large companies do little to reduce the risk that employees will fall for phishing scams.” It was a comprehensive study of more than 19,000 university and student employees concluded in the summer of 2025. Seems like a slam dunk, doesn’t it? Not so fast. The post Is cyber training worth the effort? appeared first on Cyber Protection Magazine.
- The problem with proxiesby Lou Covey on October 31, 2025 at 4:48 pm
Proxies are absolutely crucial to the operation of the internet, but they also represent a clear and present danger to users. Finding that balance is pretty much a full-time job for cybersecurity. The recent Amazon Web Services (AWS) and Microsoft Azure outages are good examples of that. Amazon explained the outage was caused by “failing intermediaries” monitoring system health, preventing proper traffic routing. Another word for intermediaries is “proxies”. When the monitoring subsystem malfunctioned, health check updates were not propagated properly, causing backend servers to appear offline even when they were active, which invalidated DNS lookups. This created a cascading failure. Likewise, the Azure outage was caused by a misconfiguration of the proxy Front Door, a global entry point for content delivery network functionality, load balancing, and application acceleration. How Proxies Function When a user wants to access a website, the request goes to the proxy server instead of going directly to the internet. The proxy server receives the request, then forwards it to the target website. It modifies the request header to hide the user’s original IP address. The post The problem with proxies appeared first on Cyber Protection Magazine.
- Bolaji Ojo and renewed importance of the pressby Lou Covey on October 23, 2025 at 6:51 pm
Technology journalism, like the rest of journalism,has struggled for most of the 21st century. The advent of AI generated content his restoring the value of professional journalists. It is crucial not just to democracies but to business success. One of the most prolific and successful technology journalists is Bolaji Ojo. He has headed editorial efforts for the EETimes, AspenCore Media, the recently closed Ojo-Yoshida Report and the now-defunct EBN. Some of those titles may be foreign to people in the cybersecurity world, but not to executives in the electronics world that cybersecurity rests upon. Cyber Protection Magazine’s chief editor talked with him this week. The post Bolaji Ojo and renewed importance of the press appeared first on Cyber Protection Magazine.
- Living Security AI-Native HRM Platform Reduces Riskby Editors Desk on October 20, 2025 at 1:11 am
AUSTIN, Texas — October 20, 2025 — Living Security today previewed its forthcoming, AI-native Human Risk Management (HRM) platform –more The post Living Security AI-Native HRM Platform Reduces Risk appeared first on Cyber Protection Magazine.
- Scam Bucket: The Docusign scam is backby Lou Covey on October 16, 2025 at 4:56 pm
For almost a decade and generally in the summer and early fall, email boxes get hit with several phishing attempts claiming to be from Docusign. This reporter received seven just in the past few weeks. It seems appropriate to give out a few tips about how to recognize them, avoid dealing with them and what you may have to do if you clicked on the link. The post Scam Bucket: The Docusign scam is back appeared first on Cyber Protection Magazine.
- Preparing Non-Human Identities for the Age of Agentic AIby Wade Ellery on October 14, 2025 at 4:35 pm
Non-human identities (NHIs) are already one of the biggest blind spots in enterprise security. Now add agentic AI into the picture. The post Preparing Non-Human Identities for the Age of Agentic AI appeared first on Cyber Protection Magazine.




