Cybersecurity Magazine Science meets Practice
- What is IEC 62443: A Cybersecurity Guide for Industrial Systemsby Tom Madsen on August 15, 2025 at 5:09 pm
Introduction This is the first article in a series, introducing the IEC 62443 standard to those interested in cybersecurity for industrial infrastructures. This first one will be looking at the IEC 62443 standard in general, with later articles looking into some of the individual documents in more detail. My goal with this series, is to The post What is IEC 62443: A Cybersecurity Guide for Industrial Systems first appeared on Cybersecurity Magazine.
- Why an Effective Detection and Response Strategy Must Focus on Very Attacked People (VAPs)by Joel Duffield on August 9, 2025 at 12:18 am
When a business is considering its vulnerabilities and turns to consider which of its people might pose the most of a risk, it’s likely their first thought is the C-Suite or the Head of IT. But it’s not always the boardroom that ranks as VIP status in the world of cyber-targeting. Gaining unauthorised access into The post Why an Effective Detection and Response Strategy Must Focus on Very Attacked People (VAPs) first appeared on Cybersecurity Magazine.
- Artificial Intelligence in Action w/ prof. Ahmed Banafaby Editor's Desk on August 5, 2025 at 1:04 am
We spoke with Prof. Ahmed Banafa from San Jose State University about his latest work, Artificial Intelligence in Action: Real-World Applications and Innovations. In this discussion, he explores some of the most pressing questions in AI today—from the challenges of teaching generative AI and the realities of AI hallucinations, to the emerging concept of Green The post Artificial Intelligence in Action w/ prof. Ahmed Banafa first appeared on Cybersecurity Magazine.
- The Role of Adaptive Learning in Continuous Vendor Monitoringby Emy Emmanuel on August 1, 2025 at 2:55 pm
In today’s hyper-connected digital landscape, third-party vendors are integral to business operations. From cloud services and HR platforms to payment processors and legal consultants. Organizations rely heavily on external providers. However, this reliance brings a significant challenge: vendor risk—and not just for third parties, but for fourth and fifth parties down the chain. Traditional risk The post The Role of Adaptive Learning in Continuous Vendor Monitoring first appeared on Cybersecurity Magazine.
- Why business logic abuse is a major threatby Mohammad Ismail on July 28, 2025 at 6:58 pm
Earlier this year one of the largest ever cases of business logic abuse was detected when a botnet across over 11 million unique IP addresses was used against the login Application Programming Interfaces (APIs) of a Fortune 500 hospitality provider based here in the UK. The attackers sought to use credential stuffing to identify valid The post Why business logic abuse is a major threat first appeared on Cybersecurity Magazine.
- Minimum Viable Company: A Practical Blueprint for Modern Cyber Resilienceby Darren Thomson on July 21, 2025 at 12:59 pm
In today’s digital economy, resilience is no longer just a technical requirement – it is a strategic imperative. As recent headlines show, cyberattacks are becoming more frequent, more sophisticated, and more damaging, and organisations need to think beyond conventional recovery models. According to recent research, nearly 4,000 cyberattacks occur globally every day, with ransomware striking The post Minimum Viable Company: A Practical Blueprint for Modern Cyber Resilience first appeared on Cybersecurity Magazine.
- Cyber Chaos in the Digital Eraby Abdelkader Keddari, Glenn Akester and Shobhit Gautam on July 17, 2025 at 5:43 pm
In recent months, some of the UK’s most recognisable retailers, including M&S, Co-op and North Face have found themselves in the cybersecurity spotlight, for all the wrong reasons. The harsh truth remains that the security strategies many retailers are relying on are outdated and unfit for purpose in the current digital landscape of relentless cyber The post Cyber Chaos in the Digital Era first appeared on Cybersecurity Magazine.
- Shadow AI: The hidden risk in AI adoptionby Steve Durbin on July 11, 2025 at 11:11 pm
AI is undoubtedly a game-changer. According to a McKinsey survey,78% of respondents deploy AI in at least one business process, a jump from 55% in 2023. For knowledge workers, AI saves time, makes work easier, and boosts productivity. Many (46%) of these workers would not give it up if prohibited. However, if employees use AI The post Shadow AI: The hidden risk in AI adoption first appeared on Cybersecurity Magazine.
- Harri Hursti on Elections, OT Security, AI Threats—and Insights from the ASEAN 5G & OT Security Summitby Baljit Singh on July 9, 2025 at 6:53 pm
I’m Baljit Singh, and today we’ve got a special guest who will be present at the ASEAN 5G and OT Security Summit to speak about his exploits, his history, as well as what we have in store for the future. So, I have with me Harri Husti, a renowned Finnish cybersecurity expert, data security pioneer, The post Harri Hursti on Elections, OT Security, AI Threats—and Insights from the ASEAN 5G & OT Security Summit first appeared on Cybersecurity Magazine.
- Fighting Ransomware w/ William Lyne (National Crime Agency)by William Lyne on July 4, 2025 at 12:03 pm
We interviewed William Lyne, Head of Cyber Intelligence at the UK National Crime Agency (NCA), on the evolving ransomware ecosystem, the business models behind ransomware-as-a-service, and the role of disruption in reducing harm. He shares how the NCA’s approach has shifted, how generative AI fits into the picture, and why effective public-private collaboration is essential. The post Fighting Ransomware w/ William Lyne (National Crime Agency) first appeared on Cybersecurity Magazine.