Cybersecurity Magazine

Cybersecurity Magazine Science meets Practice

  • Cyber Frights for Black Friday: What Retailers Need to Know About Supply Chain Cyber Risks
    by Editor's Desk on November 27, 2025 at 2:57 pm

    As the holiday season approaches, retailers are facing a perfect storm with  container imports totaling 2.5 million TEUs–a 1.6% increase from August 2024 and a 17.6% rise over August 2019–with an estimated shortfall of80,000+ truck drivers alone, unpredictable delays, and higher costs from recent tariffs. Now on top of that, there’s also been a recent surge in The post Cyber Frights for Black Friday: What Retailers Need to Know About Supply Chain Cyber Risks first appeared on Cybersecurity Magazine.

  • IEC 62443: A Cybersecurity Guide for Industrial Systems (Part 5)
    by Tom Madsen on November 24, 2025 at 7:01 pm

    Welcome back to the series on the IEC 62443 standard for industrial cybersecurity. This third installment will investigate the documents that are part of the fourth of documents, or documents in the IEC 62443-4 series. This series of documents are aimed at vendors that produce and support the gizmos in industrial infrastructure. Like the series The post IEC 62443: A Cybersecurity Guide for Industrial Systems (Part 5) first appeared on Cybersecurity Magazine.

  • Cyber Resilience in Critical Infrastructure – Insights from Recent Attacks
    by Omowunmi Makinde on November 21, 2025 at 2:43 pm

    One quiet morning in April 2025, officials at DaVita, one of the largest kidney dialysis providers in the United States, were jolted by a wireless alert that something was wrong. Cybercriminals had breached their network and were creeping around undetected for weeks, collecting the sensitive data of millions of patients. But there was an extraordinary, The post Cyber Resilience in Critical Infrastructure – Insights from Recent Attacks first appeared on Cybersecurity Magazine.

  • The AI Agent Tsunami in OT Cybersecurity: Rethinking Defense with a Focus on the Physical Process
    by Hagai Galili on November 19, 2025 at 12:16 pm

    In July 2025, Ukraine’s CERT-UA disclosed a new form of cyber threat: malware that doesn’t wait for instructions. Instead, it acts autonomously. The incident, involving an AI-enabled agent known as LameNet, is among the first publicly documented cases of artificial intelligence being used to drive independent command execution within a target environment, without an external The post The AI Agent Tsunami in OT Cybersecurity: Rethinking Defense with a Focus on the Physical Process first appeared on Cybersecurity Magazine.

  • ETSI Security Conference 2025 – Securing Open Source with Æva Black
    by Editor's Desk on November 13, 2025 at 3:47 pm

    At the ETSI Security Conference 2025, we spoke with Æva Black, cybersecurity expert and open source advocate, about the evolving landscape of open source security. Black shared insights on software supply chain traceability, the challenges of maintaining secure open source software, the role of SBOMs and intrinsic identifiers, and the importance of global collaboration in The post ETSI Security Conference 2025 – Securing Open Source with Æva Black first appeared on Cybersecurity Magazine.

  • Navigating AI Governance: The Need for Responsibility
    by Steve Durbin on November 11, 2025 at 5:02 pm

    The future of intelligent machines depends on our shared commitment to guiding them responsibly and in line with social norms and legal standards. The fast adoption of artificial intelligence into core business functions presents an opportunity to transform how organizations work, compete, and deliver value. However, this significant change in technology also requires us to The post Navigating AI Governance: The Need for Responsibility first appeared on Cybersecurity Magazine.

  • ETSI Security Conference 2025 – Can We Trust AI? with David Rogers (Copper Horse)
    by Editor's Desk on November 5, 2025 at 4:22 pm

    At the ETSI Security Conference 2025, we spoke with David Rogers, founder of Copper Horse, about the evolving landscape of AI security. Rogers shared insights on the Trusted AI Bill of Materials (TAIBOM), the challenges of securing machine learning and AI systems, the risks of data tampering, and the importance of human oversight in AI-driven The post ETSI Security Conference 2025 – Can We Trust AI? with David Rogers (Copper Horse) first appeared on Cybersecurity Magazine.

  • From Ransomware to Quantum Threats: Interview with Michael Fasulo
    by Editor's Desk on November 3, 2025 at 1:44 pm

    In this episode, Paulo Henrique speaks with Michael Fasulo, Senior Director of Portfolio Marketing at Commvault, about how organizations can evolve from reactive defense to cyber resilience in the face of fast-moving threats. Michael explains why exfiltration—not just ransomware—defines today’s blast radius, and how post-quantum cryptography (PQC)and crypto-agility should be treated as layered controls rather The post From Ransomware to Quantum Threats: Interview with Michael Fasulo first appeared on Cybersecurity Magazine.

  • Cybersecurity Awareness Month: Rethinking Defences to Boost Security
    by Editor's Desk on October 30, 2025 at 3:10 pm

    A recent wave of incidents has dominated headlines, from cyber events crippling airports to high-profile breaches at reputable companies such as Marks & Spencer and Jaguar Land Rover. As attacks become more advanced and more frequent, businesses must re-evaluate their defenses, not just to prevent an attack, but to ensure resilience and business continuity when The post Cybersecurity Awareness Month: Rethinking Defences to Boost Security first appeared on Cybersecurity Magazine.

  • ETSI Security Conference 2025 – Singapore’s IoT Journey with Dr. Melvyn Kuan (Cyber Security Agency of Singapore)
    by Editor's Desk on October 28, 2025 at 10:18 am

    To start, could you briefly describe your role in CSA and how the Cybersecurity Engineering Centre is structured, especially regarding IoT and consumer device security? I am part of CSA’s Cyber Security Engineering Centre where we are tasked to engineer secure technology adoption & lead cybersecurity assurance to support CSA’s mission of keeping Singapore’s cyberspace The post ETSI Security Conference 2025 – Singapore’s IoT Journey with Dr. Melvyn Kuan (Cyber Security Agency of Singapore) first appeared on Cybersecurity Magazine.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.