Please turn JavaScript on
header-image

Cybersecurity Magazine

Subscribe in seconds and receive Cybersecurity Magazine's news feed updates in your inbox, on your phone or even read them from your own news page here on follow.it.

You can select the updates using tags or topics and you can add as many websites to your feed as you like.

And the service is entirely free!

Follow Cybersecurity Magazine: Cybersecurity Magazine - Science meets Practice

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.25 / day

Message History

In 2026, cyber incidents is the top global risk for the fifth year in a row, according to global insurer Allianz Commercial’s Risk Barometer, with its highest-ever score (42% of responses), and by a higher margin than ever before (10%). It ranks as the main corporate concern in every region (Americas, Asia Pacific, Europe, and Africa and Middle East) surveyed in the Allianz R...


Read full story

Welcome back to this series on security standards for operational technologies. In the last one we investigated IEC 61508 and IEC 61850. You can find a link to that one at the end of this one.

This article will focus exclusively on IEC 62351. IEC 62351 is an international cybersecurity standard focused on protecting communication protocols used in power system automati...


Read full story

Artificial Intelligence (AI) is rapidly transforming the landscape of cybersecurity, offering advanced tools to detect, prevent, and respond to threats across multiple sectors. As cyberattacks grow in sophistication, organisations are increasingly adopting AI-powered controls to strengthen their defences. Penning down few thoughts on how the enablement of AI controls in cyber...


Read full story

Executive board members need to understand the business implications of technical data. Traditional reporting methods do not connect well with leaders, leading to misinformed decisions and inadequate resources. To effectively translate cyber risk metrics to executives, C-suite leaders should focus on business impact rather than technical risks.

Limits of Traditional Cyber...

Read full story

“I don’t care what that report says, the threat actor has to be utilizing vector #1 because that is what our threat model says they’ll use….”

Although the comment above is offered for humor, cyber security professionals are routinely at risk of making analytical errors very similar to the one implied. These errors are rarely the result of poor intent, lack of effort, o...


Read full story