Cybersecurity Magazine Science meets PracticeAt Cybersecurity Magazine (CSM) we first and foremost aim to bring cybersecurity associated information in simple language accessible to everyone.
- Is your edge and border defence tech vulnerable, and what to do about itby Andy Swift on April 15, 2025 at 2:45 pm
Following a number of recent high-profile events, edge and border defence technologies such as firewalls, VPN gateways and intrusion prevention systems have been getting a lot of attention from both security researchers and threat actors alike. These include a mass exploitation campaign against Fortinet firewalls, summer 2024’s CrowdStrike outage, and the use of a vulnerability The post Is your edge and border defence tech vulnerable, and what to do about it first appeared on Cybersecurity Magazine.
- Why businesses can no longer fight cybercrime aloneby Dan Bridges on April 10, 2025 at 12:16 am
Imagine a typical office filled with dedicated workers tapping away at their computers – a ubiquitous set-up that, on the face of it, seems innocent enough. However, instead of traditional employees, these people are criminal operatives, hacking, phishing and defrauding thousands of innocent victims as part of highly sophisticated teams organised just like legitimate businesses. The post Why businesses can no longer fight cybercrime alone first appeared on Cybersecurity Magazine.
- The Role of Machine Learning Security in Protecting Tesla Optimus from Adversarial Attacksby Olabisi Olajide on April 3, 2025 at 9:16 pm
As robotics and artificial intelligence (AI) technology develop, humanoid robots such as Tesla’s Optimus mark the front edge of automation. Optimus can accomplish a variety of jobs usually done by humans, including hazardous and repetitive tasks using machine learning (ML). However, adversarial assaults might jeopardise Optimus’s performance, dependability, and safety since it largely depends on The post The Role of Machine Learning Security in Protecting Tesla Optimus from Adversarial Attacks first appeared on Cybersecurity Magazine.
- World Backup Day 2025: Prioritising data protectionby Editor's Desk on March 31, 2025 at 12:16 pm
With the 15th annual World Backup Day being this year, it serves as a reminder that data backups and disaster recovery strategies are more critical than ever. The last 15 years have seenthe scale and complexity of data grow, and both the number and sophistication of cyberthreats have grown with it. The UK Gov Cyber The post World Backup Day 2025: Prioritising data protection first appeared on Cybersecurity Magazine.
- The Humanized Internet: Dignity, Digital Identity and Democracyby Editor's Desk on March 27, 2025 at 3:00 pm
The Humanized Internet: Dignity, Digital Identity and Democracy https://www.riverpublishers.com/book_details.php?book_id=671 What does it mean to have a humanized Internet? How can we reclaim control over our digital identities in an era of mass surveillance and centralized power? In this interview, we sit down with Monique J. Morrow and Akram Alfawakheeri, the authors of The Humanized Internet: The post The Humanized Internet: Dignity, Digital Identity and Democracy first appeared on Cybersecurity Magazine.
- In Defense of C/C++ (Part 3)by Tom Madsen on March 25, 2025 at 8:24 pm
In this third part of the series on secure programming in C and C++ I will be looking into some of the tooling available to help us create secure code in C and C++. The first article looked at the reasons why there has been a push away from C/C++, the second one investigated how The post In Defense of C/C++ (Part 3) first appeared on Cybersecurity Magazine.
- In Defense of C/C++ (Part 2)by Tom Madsen on March 21, 2025 at 4:11 am
With great power comes great responsibility Spiderman Welcome back to this second part of the series. In the first part, we looked into why there are recommendations for moving away from C/C++. In this part, we will look into how we can mitigate and remove some of the very real risks that C and C++ The post In Defense of C/C++ (Part 2) first appeared on Cybersecurity Magazine.
- In Defense of C/C++ (Part 1)by Tom Madsen on March 18, 2025 at 12:53 pm
Any sufficiently advanced bug is indistinguishable from a feature Rich Kulawiec At the end of 2023, and early 2024, NSA and the White House respectively came out with recommendations to move away from C and C++, in favor of Rust, because of memory safety concerns. You can find links to these recommendations at the end The post In Defense of C/C++ (Part 1) first appeared on Cybersecurity Magazine.
- Cyber Threats to Digital Identity Systems: Challenges and Mitigation Strategies in an Evolving Landscapeby John Prasad on March 15, 2025 at 12:17 am
The global transition to digital infrastructure has heightened the reliance on secure digital identity systems, which are now critical to government operations, public services, and citizen engagement. The increasing digitalization of public infrastructure has revolutionized the way governments interact with citizens, manage services, and secure sensitive data, with digital identity sys- tems becoming pivotal to The post Cyber Threats to Digital Identity Systems: Challenges and Mitigation Strategies in an Evolving Landscape first appeared on Cybersecurity Magazine.
- The Silent Threat: How to Mitigate Cyber Risks and Safeguard Businessesby Mike Donaldson on March 12, 2025 at 12:11 pm
An alarming rise in corporate cyberattacks and data breaches nationwide has left every industry on high alert. The relentless onslaught of ransomware attacks, phishing scams, and insider threats has made cybersecurity a top priority for all businesses. Last year alone, a staggering 72.7% of organizations globally fell victim to ransomware attacks – an eye-opening reminder The post The Silent Threat: How to Mitigate Cyber Risks and Safeguard Businesses first appeared on Cybersecurity Magazine.