 
		
					Ukraine, cyber war and CNI
Critical infrastructure is on the front line of the war in Ukraine. And as the conflict approaches its fourth year, there is little sign of that changing. But military, or kinetic, strikes against infrastructure are […]
 
		
					Critical infrastructure is on the front line of the war in Ukraine. And as the conflict approaches its fourth year, there is little sign of that changing. But military, or kinetic, strikes against infrastructure are […]
 
		
					Bug bounties are big business. The most accomplished hackers can now make a good living hunting down and disclosing security flaws. Some of the largest programmes now offer bounties of $1m or more. A growing […]
 
		
					Distributed denial of service attacks, or DDoS, remain a serious source of disruption across the internet. DDoS attacks continue to grow in their frequency and volume. Researchers at NETSCOUT recorded over 8m DDoS attacks in […]
 
		
					Is cybersecurity’s skills crisis one of its own making? There are between three and four million vacancies for cybersecurity professionals worldwide, depending on the research you read. Over the years, there has been plenty of […]
 
		
					Education is an attractive target for malicious actors in cyberspace. Hackers attack schools, colleges and universities for the information they hold. That includes personal, academic and research data. And they are also vulnerable to extortion […]
 
		
					The way we measure security threats is changing. As security has become a board-level priority, cybersecurity teams need to think in terms of risk. But where does that leave vulnerability scores? Are venerable systems such […]
 
		
					One of the biggest, if not the biggest, risks in cybersecurity is human behaviour. More than three quarters of security breaches result from human action or errors. But the cybersecurity industry focuses more on technical […]
 
		
					AI clearly offers benefits. But when it comes to security, it also brings its own risks. Artificial intelligence is often described as a “black box”. We can see what we put in, and what comes […]
 
		
					The vast majority of internet users are no longer humans. The stark reality is that most online traffic is now between machines, or software. Non-human identities, or machine identities, now outnumber human actors on the […]
 
		
					Effective cybersecurity is no longer about stopping every attack. That is simply no longer possible. But moving from prevention to accepting that attacks will happen means thinking much more about business risk. That is not […]
Copyright © 2025 | MH Magazine WordPress Theme by MH Themes