Cybersecurity Magazine Science meets Practice
- IEC 62443: A Cybersecurity Guide for Industrial Systems (Part 4)by Tom Madsen on October 8, 2025 at 9:07 am
Welcome back to the series on the IEC 62443 standard for industrial cybersecurity. This third installment will investigate the documents that are part of the second series of documents, or documents in the IEC 62443-3 series. This series of documents are much more operational in nature than the ones from previous articles. So those of The post IEC 62443: A Cybersecurity Guide for Industrial Systems (Part 4) first appeared on Cybersecurity Magazine.
- ETSI Security Conference 2025 ā Insights into the Global Cybersecurity Landscape with NCSCās Ollie Whitehouseby Editor's Desk on October 6, 2025 at 3:34 pm
At the ETSI Security Conference 2025, we spoke with Ollie Whitehouse, Chief Technical Officer at the UKās National Cyber Security Centre (NCSC), about the evolving global cybersecurity landscape, emerging threats in telecommunications, the role of standards and cross-sector collaboration, and how organizations can prepare for the challenges ahead. Ā Ollie, could you share how you The post ETSI Security Conference 2025 ā Insights into the Global Cybersecurity Landscape with NCSCās Ollie Whitehouse first appeared on Cybersecurity Magazine.
- Predictive Cyber Defense with Agentic AIby Cynthia Udoka Duru on October 2, 2025 at 11:11 pm
Introduction In todayās increasingly connected world, cybersecurity has become a critical aspect of protecting sensitive information from malicious actors. With cyber threats becoming increasingly advanced, companies need to strategize their cyber defenses to get the next step ahead. More complex and advanced firewalls and antivirus software are no longer sufficient and applicable to deal with The post Predictive Cyber Defense with Agentic AI first appeared on Cybersecurity Magazine.
- Securing the Software-Defined Vehicle: How Rust and Formal Verification are Revolutionizing Automotive Cybersecurityby Caroline Guillaume on October 1, 2025 at 1:16 pm
Modern vehicles rely heavily on software, increasing their vulnerability to cybersecurity threats.Memory safety is now top of mind and the rise of Rust offers more memory safety and combines with C/C++ for automotive systems, in attempt to mitigate inherent vulnerabilities. Formal verification ensures software correctness through mathematical assurance, reducing risks and costs with changing landscapes The post Securing the Software-Defined Vehicle: How Rust and Formal Verification are Revolutionizing Automotive Cybersecurity first appeared on Cybersecurity Magazine.
- The Real Cost of OT Cyber: Why Process-Level Security Is a Financial Decisionby Hagai Galili on September 26, 2025 at 8:19 am
The threat of an OT cyber-attack isnāt just an operational risk. Itās also a financial one. Companies across critical infrastructure and process industries spend billions each year on OT cybersecurity. But breaches keep happening, and when they do, the costs are not confined to IT. They include production losses, fines, and reputational damage. In some The post The Real Cost of OT Cyber: Why Process-Level Security Is a Financial Decision first appeared on Cybersecurity Magazine.
- Data Security Wake-Up Call: How Modern Cyberattacks Are Redefining Privacy and Complianceby Tim Freestone on September 22, 2025 at 10:12 am
The numbers tell a sobering story. Cloud intrusions surged 136% in just the first half of 2025, according to CrowdStrikeās latest Threat Hunting Report. But what should keep data protection officers awake at night is that 81% of these intrusions used zero malware. No viruses, no trojans. Just stolen credentials and patient adversaries who understand The post Data Security Wake-Up Call: How Modern Cyberattacks Are Redefining Privacy and Compliance first appeared on Cybersecurity Magazine.
- Governance Gaps: How Weak Data Policies Invite AI-Driven Ransomwareby Nathaniel Adeniyi Akande on September 15, 2025 at 12:37 pm
In todayās digital economy, data is often described as āthe new oilā because of its role in fueling artificial intelligence (AI), exciting user experiences, driving predictive analytics, and enhancing operational efficiency. However, unlike oil, which is regulated through international trade laws and environmental controls, data does not have as much control and oversight as Oil, The post Governance Gaps: How Weak Data Policies Invite AI-Driven Ransomware first appeared on Cybersecurity Magazine.
- AI Agents: The Next Big Cybersecurity Challenge w/ Frank Teruelby Editor's Desk on September 10, 2025 at 9:17 pm
AI agents are creating powerful new opportunities for both businesses and everyday users ā from smarter customer experiences to increased efficiency. At the same time, they introduce serious cybersecurity risks, as adversaries weaponize these agents to mimic real users, maintain fake identities, and evade detection. In this interview, Frank Teruel, COO of Arkose Labs, explains The post AI Agents: The Next Big Cybersecurity Challenge w/ Frank Teruel first appeared on Cybersecurity Magazine.
- IEC 62443: A Cybersecurity Guide for Industrial Systems (Part 3)by Tom Madsen on September 10, 2025 at 11:38 am
Welcome back to the series on the IEC 62443 standard for industrial cybersecurity. This third installment will investigate the documents that are part of the second series of documents, or documents in the IEC 62443-2 series. Series Documents IEC 62443-2 ⢠62443-2-1 Establishing an IACS cybersecurity management system ⢠62443-2-2 IACS Security Protection Scheme (SPS) The post IEC 62443: A Cybersecurity Guide for Industrial Systems (Part 3) first appeared on Cybersecurity Magazine.
- Fortifying Your Future: A Business Leaderās Guide to Securing Robotics and Automationby Adetunji Oludele Adebayo on September 4, 2025 at 12:05 pm
The Unseen Threat in the Smart Factory Robotics and Autonomous Systems (RAS) are transforming how businesses operate today by increasing precision, efficiency, and 24/7 functionality. Imagine a company where a fleet of advanced warehouse robots manages inventory independently, a manufacturing line operates with sub-millimetre accuracy, and a drone inspects infrastructure, all without human assistance. This The post Fortifying Your Future: A Business Leaderās Guide to Securing Robotics and Automation first appeared on Cybersecurity Magazine.