Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 143

Feed: Security Magazine – Guidance

Articles recieved 04/05/2022
Article: A new level of trust: Corporate-wide OpenChain ISO/IEC 5230:2020 conformance - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97544-a-new-level-of-trust-corporate-wide-openchain-iso-iec-5230-2020-conformance 
🔥🔥
 
Published: 2022 05 04 04:00:00
Received: 2022 05 04 04:21:57
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
04:21 A new level of trust: Corporate-wide OpenChain ISO/IEC 5230:2020 conformance
🔥🔥
Articles recieved 06/04/2022
Article: A transformative journey - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/97203-a-transformative-journey 
🔥🔥
 
Published: 2022 03 04 05:00:00
Received: 2022 04 06 13:21:33
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Not just another threat report! - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/97345-not-just-another-threat-report 
🔥🔥
 
Published: 2022 04 06 04:00:00
Received: 2022 04 06 04:21:40
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
13:21 A transformative journey
🔥🔥
04:21 Not just another threat report!
🔥🔥
Articles recieved 04/02/2022
Article: Christmas came early — Log4Shell & mitigating open-source vulnerabilities - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/97028-christmas-came-early-log4shell-and-mitigating-open-source-vulnerabilities 
🔥🔥
 
Published: 2022 02 04 05:00:00
Received: 2022 02 04 15:21:44
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Christmas came early – Log4Shell & mitigating open-source vulnerabilities - published almost 3 years ago.
Content:
https://www.securitymagazine.com/articles/97028-christmas-came-early-log4shell-and-mitigating-open-source-vulnerabilities 
🔥🔥
 
Published: 2022 02 04 05:00:00
Received: 2022 02 04 05:21:52
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
15:21 Christmas came early — Log4Shell & mitigating open-source vulnerabilities
🔥🔥
05:21 Christmas came early – Log4Shell & mitigating open-source vulnerabilities
🔥🔥
Articles recieved 07/01/2022
Article: New year, new threat: Rise of the enterprise-sized initial access broker - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/96859-new-year-new-threat-rise-of-the-enterprise-sized-initial-access-broker 
🔥🔥
 
Published: 2022 01 07 05:00:00
Received: 2022 01 07 14:20:09
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
14:20 New year, new threat: Rise of the enterprise-sized initial access broker
🔥🔥
Articles recieved 08/12/2021
Article: A cybersecurity year in review - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/96655-a-cybersecurity-year-in-review 
🔥🔥
 
Published: 2021 12 08 05:00:00
Received: 2021 12 08 14:00:40
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
14:00 A cybersecurity year in review
🔥🔥
Articles recieved 17/11/2021
Article: 2021 BlackBerry Security Summit roundup - published about 3 years ago.
Content:
https://www.securitymagazine.com/articles/96534-2021-blackberry-security-summit-roundup 
🔥🔥
 
Published: 2021 11 17 05:00:00
Received: 2021 11 17 06:00:21
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
06:00 2021 BlackBerry Security Summit roundup
🔥🔥
Articles recieved 11/10/2021
Article: Emerging technology, evolving threats — Part III: 5G and the new surfaces and strategies - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/96274-emerging-technology-evolving-threats-part-iii-5g-and-the-new-surfaces-and-strategies 
🔥🔥
 
Published: 2021 10 11 04:00:00
Received: 2021 10 11 15:00:19
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
15:00 Emerging technology, evolving threats — Part III: 5G and the new surfaces and strategies
🔥🔥
Articles recieved 10/09/2021
Article: The Role of Machine Learning in Cybersecurity - published almost 6 years ago.
Content:
https://www.securitymagazine.com/articles/90064-the-role-of-machine-learning-in-cybersecurity 
🔥🔥
 
Published: 2019 04 01 04:00:00
Received: 2021 09 10 20:00:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Machine Learning: How It Works - published over 5 years ago.
Content:
https://www.securitymagazine.com/articles/90173-machine-learning-how-it-works 
🔥🔥
 
Published: 2019 05 01 04:00:00
Received: 2021 09 10 20:00:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Artificial Intelligence Changes Everything in the Security Industry - published over 5 years ago.
Content:
https://www.securitymagazine.com/articles/90298-artificial-intelligence-changes-everything-in-the-security-industry 
🔥🔥
 
Published: 2019 06 01 04:00:00
Received: 2021 09 10 20:00:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Privacy: The Age of Context – Ensuring the Benefits of Sharing Outweigh the Risks - published over 5 years ago.
Content:
https://www.securitymagazine.com/articles/90456-privacy-the-age-of-context-ensuring-the-benefits-of-sharing-outweigh-the-risks 
🔥🔥
 
Published: 2019 07 01 04:00:00
Received: 2021 09 10 20:00:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: The Communications Assistance for Law Enforcement Act: a Lesson from the Past - published over 5 years ago.
Content:
https://www.securitymagazine.com/articles/90630-the-communications-assistance-for-law-enforcement-act-a-lesson-from-the-past 
🔥🔥
 
Published: 2019 08 01 04:00:00
Received: 2021 09 10 20:00:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: How Sense of Privacy Threatens Facial Recognition's Protective Power - published over 5 years ago.
Content:
https://www.securitymagazine.com/articles/90812-how-sense-of-privacy-threatens-facial-recognitions-protective-power 
🔥🔥
 
Published: 2019 09 02 04:00:00
Received: 2021 09 10 20:00:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Better Mobile Security with a Mobile Threat Defense Plan - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/91817-better-mobile-security-with-a-mobile-threat-defense-plan 
🔥🔥
 
Published: 2020 03 01 05:00:00
Received: 2021 09 10 20:00:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
20:00 The Role of Machine Learning in Cybersecurity
🔥🔥
20:00 Machine Learning: How It Works
🔥🔥
20:00 Artificial Intelligence Changes Everything in the Security Industry
🔥🔥
20:00 Privacy: The Age of Context – Ensuring the Benefits of Sharing Outweigh the Risks
🔥🔥
20:00 The Communications Assistance for Law Enforcement Act: a Lesson from the Past
🔥🔥
20:00 How Sense of Privacy Threatens Facial Recognition's Protective Power
🔥🔥
20:00 Better Mobile Security with a Mobile Threat Defense Plan
🔥🔥
Articles recieved 02/09/2021
Article: Emerging technology, evolving threats — Part II: The asymmetry effect - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/96012-emerging-technology-evolving-threats-part-ii-the-asymmetry-effect 
🔥🔥
 
Published: 2021 09 02 13:00:00
Received: 2021 09 02 14:00:19
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
14:00 Emerging technology, evolving threats — Part II: The asymmetry effect
🔥🔥
Articles recieved 01/09/2021
Article: AR and VR: How Immersive Technology Is Bringing Cybersecurity Scenarios to Life - published over 5 years ago.
Content:
https://www.securitymagazine.com/articles/91016-ar-and-vr-how-immersive-technology-is-bringing-cybersecurity-scenarios-to-life 
🔥🔥
 
Published: 2019 10 01 04:00:00
Received: 2021 09 01 17:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: "Trust" Revisited: The Birth of Continuous Authentication - published about 5 years ago.
Content:
https://www.securitymagazine.com/articles/91201-trust-revisited-the-birth-of-continuous-authentication 
🔥🔥
 
Published: 2019 11 01 04:00:00
Received: 2021 09 01 17:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Expense-in-Depth: Total Cost of Controls Reconsidered - published about 5 years ago.
Content:
https://www.securitymagazine.com/articles/91345-expense-in-depth-total-cost-of-controls-reconsidered 
🔥🔥
 
Published: 2019 12 01 05:00:00
Received: 2021 09 01 17:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: New Year Prognostications: A Perennial Guide for the Perplexed - published about 5 years ago.
Content:
https://www.securitymagazine.com/articles/91486-new-year-prognostications-a-perennial-guide-for-the-perplexed 
🔥🔥
 
Published: 2020 01 01 05:00:00
Received: 2021 09 01 17:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: A Framework for Measuring InfoSec as a Business Function - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/91648-a-framework-for-measuring-infosec-as-a-business-function 
🔥🔥
 
Published: 2020 02 02 05:00:00
Received: 2021 09 01 17:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Attribution: 3 Questions to Ask When Deciding How It Matters - published almost 5 years ago.
Content:
https://www.securitymagazine.com/articles/92036-attribution-3-questions-to-ask-when-deciding-how-it-matters 
🔥🔥
 
Published: 2020 04 01 04:00:00
Received: 2021 09 01 17:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: DECADE OF THE RATs: Novel Cross-Platform APT Attacks Targeting Linux Windows and Android - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/92253-decade-of-the-rats-novel-cross-platform-apt-attacks-targeting-linux-windows-and-android 
🔥🔥
 
Published: 2020 05 01 04:00:00
Received: 2021 09 01 17:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Unified Endpoint Security: Combating the Chaos, Complexity and Other Conundrums Plaguing Our Community - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/92490-unified-endpoint-security-combating-the-chaos-complexity-and-other-conundrums-plaguing-our-community 
🔥🔥
 
Published: 2020 06 01 04:00:00
Received: 2021 09 01 17:00:10
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Zero trust further considered - another benefit of living in the times of AI - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/92726-zero-trust-further-considered---another-benefit-of-living-in-the-times-of-ai 
🔥🔥
 
Published: 2020 07 01 04:00:00
Received: 2021 09 01 17:00:10
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Securing our Democracy: The case for robust campaign cybersecurity - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/92972-securing-our-democracy-the-case-for-robust-campaign-cybersecurity 
🔥🔥
 
Published: 2020 08 01 04:00:00
Received: 2021 09 01 17:00:10
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Report shows $11.4M lost globally every minute to cybercrime - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/93195-report-shows-114m-lost-globally-every-minute-to-cybercrime 
🔥🔥
 
Published: 2020 08 31 09:00:00
Received: 2021 09 01 17:00:10
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: It’s coming: National Cybersecurity Awareness Month - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/93214-its-coming-national-cybersecurity-awareness-month 
🔥🔥
 
Published: 2020 09 01 04:00:00
Received: 2021 09 01 17:00:10
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Insider Threat Report: 61% of companies have had an insider attack in the past year - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/93207-insider-threat-report-61-of-companies-have-had-an-insider-attack-in-the-past-year 
🔥🔥
 
Published: 2020 09 02 12:00:00
Received: 2021 09 01 13:00:28
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: More than 80% of government cybersecurity leaders say private-public partnerships a necessity - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/93381-more-than-80-of-government-cybersecurity-leaders-say-private-public-partnerships-a-necessity 
🔥🔥
 
Published: 2020 09 17 12:55:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Can the voting process be hacked? - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/93385-can-the-voting-process-be-hacked 
🔥🔥
 
Published: 2020 09 17 14:04:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Poor incident detection can cost your organization a fortune - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/93173-poor-incident-detection-can-cost-your-organization-a-fortune 
🔥🔥
 
Published: 2020 09 24 10:00:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Mitigating digital banking security issues during the pandemic - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/93221-mitigating-digital-banking-security-issues-during-the-pandemic 
🔥🔥
 
Published: 2020 09 25 09:00:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Group attribution error – The most pervasive and potentially consequential threat of our day - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/93517-group-attribution-error-the-most-pervasive-and-potentially-consequential-threat-of-our-day 
🔥🔥
 
Published: 2020 10 01 04:00:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Increased enterprise security for the “new normal” working culture - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/93386-increased-enterprise-security-in-the-new-normal-working-culture 
🔥🔥
 
Published: 2020 10 09 05:40:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Simple 'back-to-virtual-school' must-haves to implement in your organization - published over 4 years ago.
Content:
https://www.securitymagazine.com/articles/93266-simple-back-to-virtual-school-must-haves-to-implement-in-your-organization 
🔥🔥
 
Published: 2020 10 14 08:34:00
Received: 2021 09 01 13:00:27
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
17:00 AR and VR: How Immersive Technology Is Bringing Cybersecurity Scenarios to Life
🔥🔥
17:00 "Trust" Revisited: The Birth of Continuous Authentication
🔥🔥
17:00 Expense-in-Depth: Total Cost of Controls Reconsidered
🔥🔥
17:00 New Year Prognostications: A Perennial Guide for the Perplexed
🔥🔥
17:00 A Framework for Measuring InfoSec as a Business Function
🔥🔥
17:00 Attribution: 3 Questions to Ask When Deciding How It Matters
🔥🔥
17:00 DECADE OF THE RATs: Novel Cross-Platform APT Attacks Targeting Linux Windows and Android
🔥🔥
17:00 Unified Endpoint Security: Combating the Chaos, Complexity and Other Conundrums Plaguing Our Community
🔥🔥
17:00 Zero trust further considered - another benefit of living in the times of AI
🔥🔥
17:00 Securing our Democracy: The case for robust campaign cybersecurity
🔥🔥
17:00 Report shows $11.4M lost globally every minute to cybercrime
🔥🔥
17:00 It’s coming: National Cybersecurity Awareness Month
🔥🔥
13:00 Insider Threat Report: 61% of companies have had an insider attack in the past year
🔥🔥
13:00 More than 80% of government cybersecurity leaders say private-public partnerships a necessity
🔥🔥
13:00 Can the voting process be hacked?
🔥🔥
13:00 Poor incident detection can cost your organization a fortune
🔥🔥
13:00 Mitigating digital banking security issues during the pandemic
🔥🔥
13:00 Group attribution error – The most pervasive and potentially consequential threat of our day
🔥🔥
13:00 Increased enterprise security for the “new normal” working culture
🔥🔥
13:00 Simple 'back-to-virtual-school' must-haves to implement in your organization
🔥🔥
Articles recieved 02/08/2021
Article: Emerging technology, evolving threats — Part I: Quantum computing - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95765-emerging-technology-evolving-threats-part-i-quantum-computing 
🔥🔥
 
Published: 2021 08 02 04:00:00
Received: 2021 08 02 10:00:10
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
10:00 Emerging technology, evolving threats — Part I: Quantum computing
🔥🔥
Articles recieved 29/07/2021
Article: Choosing the right security assessment service for your enterprise - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95738-choosing-the-right-security-assessment-service-for-your-enterprise 
🔥🔥
 
Published: 2021 07 29 04:00:00
Received: 2021 07 29 05:00:17
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Choosing the right security assessment service for your enterprise
🔥🔥
Articles recieved 26/07/2021
Article: Modernizing security with data fusion - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95710-modernizing-security-with-data-fusion 
🔥🔥
 
Published: 2021 07 26 12:43:00
Received: 2021 07 26 13:00:04
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
13:00 Modernizing security with data fusion
🔥🔥
Articles recieved 20/07/2021
Article: Ransomware prevention tactics keep businesses healthy - published over 3 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/95671-ransomware-prevention-tactics-keep-businesses-healthy 
🔥🔥
 
Published: 2021 07 20 04:00:00
Received: 2021 07 20 05:00:14
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Ransomware prevention tactics keep businesses healthy
🔥🔥
Articles recieved 14/07/2021
Article: Using biometrics to reinvent customer authentication - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95611-using-biometrics-to-reinvent-customer-authentication 
🔥🔥
 
Published: 2021 07 14 04:00:00
Received: 2021 07 14 05:00:08
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Using biometrics to reinvent customer authentication
🔥🔥
Articles recieved 13/07/2021
Article: Fostering a healthy workplace environment in the aftermath of trauma - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95622-fostering-a-healthy-workplace-environment-in-the-aftermath-of-trauma 
🔥🔥
 
Published: 2021 07 13 04:00:00
Received: 2021 07 13 05:00:04
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Fostering a healthy workplace environment in the aftermath of trauma
🔥🔥
Articles recieved 01/07/2021
Article: Despite ransomware distractions, the insider risk continues - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95542-despite-ransomware-distractions-the-insider-risk-continues 
🔥🔥
 
Published: 2021 07 01 04:00:00
Received: 2021 07 01 06:00:31
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
06:00 Despite ransomware distractions, the insider risk continues
🔥🔥
Articles recieved 30/06/2021
Article: How to infuse agility into security operations - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95532-how-to-infuse-agility-into-security-operations 
🔥🔥
 
Published: 2021 06 30 04:00:00
Received: 2021 06 30 05:00:03
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 How to infuse agility into security operations
🔥🔥
Articles recieved 28/06/2021
Article: Secure remote access: Considerations for K-12 and universities - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95505-secure-remote-access-considerations-for-k-12-and-universities 
🔥🔥
 
Published: 2021 06 28 04:00:00
Received: 2021 06 28 05:00:28
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Secure remote access: Considerations for K-12 and universities
🔥🔥
Articles recieved 17/06/2021
Article: The reality of the shared responsibility model - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95419-the-reality-of-the-shared-responsibility-model 
🔥🔥
 
Published: 2021 06 17 04:00:00
Received: 2021 06 17 05:00:11
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 The reality of the shared responsibility model
🔥🔥
Articles recieved 16/06/2021
Article: Using risk quantification to assess cyber risk - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95409-using-risk-quantification-to-assess-cyber-risk 
🔥🔥
 
Published: 2021 06 16 04:00:00
Received: 2021 06 16 05:00:18
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Using risk quantification to assess cyber risk
🔥🔥
Articles recieved 15/06/2021
Article: The new threat economy: A guide to cybercrime’s transformation – and how to respond - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95387-the-new-threat-economy-a-guide-to-cybercrimes-transformation-and-how-to-respond 
🔥🔥
 
Published: 2021 06 15 04:00:00
Received: 2021 06 15 05:00:26
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 The new threat economy: A guide to cybercrime’s transformation – and how to respond
🔥🔥
Articles recieved 08/06/2021
Article: Law enforcement recovers $2.3 million in bitcoin paid for Colonial Pipeline ransom - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95375-law-enforcement-recovers-23-million-in-bitcoin-paid-for-colonial-pipeline-ransom 
🔥🔥
 
Published: 2021 06 08 13:49:00
Received: 2021 06 08 14:00:13
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
14:00 Law enforcement recovers $2.3 million in bitcoin paid for Colonial Pipeline ransom
🔥🔥
Articles recieved 04/06/2021
Article: IBM gives out $3 million in education security preparedness grants to schools - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95354-ibm-gives-out-3-million-in-education-security-preparedness-grants-to-schools 
🔥🔥
 
Published: 2021 06 04 04:00:00
Received: 2021 06 04 05:00:19
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 IBM gives out $3 million in education security preparedness grants to schools
🔥🔥
Articles recieved 01/06/2021
Article: Reflections in the wake of RSA 2021: Cyber resiliency - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95326-reflections-in-the-wake-of-rsa-2021-cyber-resiliency 
🔥🔥
 
Published: 2021 06 01 04:00:00
Received: 2021 06 01 15:00:21
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
15:00 Reflections in the wake of RSA 2021: Cyber resiliency
🔥🔥
Articles recieved 26/05/2021
Article: Preparing for the next elaborate cyberattack could put your organization at risk - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95276-preparing-for-the-next-elaborate-cyberattack-could-put-your-organization-at-risk 
🔥🔥
 
Published: 2021 05 26 04:00:00
Received: 2021 05 26 05:00:22
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Preparing for the next elaborate cyberattack could put your organization at risk
🔥🔥
Articles recieved 24/05/2021
Article: Not your grandmother’s ransomware - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95275-not-your-grandmothers-ransomware 
🔥🔥
 
Published: 2021 05 24 15:59:00
Received: 2021 05 24 17:00:18
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: The return of vaccinated employees with un-vaccinated computers - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95242-the-return-of-vaccinated-employees-with-un-vaccinated-computers 
🔥🔥
 
Published: 2021 05 24 04:00:00
Received: 2021 05 24 05:00:21
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
17:00 Not your grandmother’s ransomware
🔥🔥
05:00 The return of vaccinated employees with un-vaccinated computers
🔥🔥
Articles recieved 20/05/2021
Article: To avoid insider threats, security strategies call for behavioral profiling and anomaly comparison - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94826-to-avoid-insider-threats-security-strategies-call-for-behavioral-profiling-and-anomaly-comparison 
🔥🔥
 
Published: 2021 05 20 04:00:00
Received: 2021 05 20 05:00:18
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 To avoid insider threats, security strategies call for behavioral profiling and anomaly comparison
🔥🔥
Articles recieved 19/05/2021
Article: Cybersecurity and Geopolitical podcast: Episode 4, Misinformation & Outright Conspiracy Theories - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95195-cybersecurity-and-geopolitical-podcast-episode-4-misinformation-outright-conspiracy-theories 
🔥🔥
 
Published: 2021 05 19 15:00:00
Received: 2021 05 19 18:00:24
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Protecting the enterprise against state-sponsored attacks - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94817-protecting-the-enterprise-against-state-sponsored-attacks 
🔥🔥
 
Published: 2021 05 19 04:00:00
Received: 2021 05 19 05:00:15
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
18:00 Cybersecurity and Geopolitical podcast: Episode 4, Misinformation & Outright Conspiracy Theories
🔥🔥
05:00 Protecting the enterprise against state-sponsored attacks
🔥🔥
Articles recieved 10/05/2021
Article: Managing the 5G risks in an unified and standardized way - published over 3 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/94816-managing-the-5g-risks-in-an-unified-and-standardized-way 
🔥🔥
 
Published: 2021 05 10 04:00:00
Received: 2021 05 10 05:00:09
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
05:00 Managing the 5G risks in an unified and standardized way
🔥🔥
Articles recieved 05/05/2021
Article: Exploitation in the time of COVID - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95138-exploitation-in-the-time-of-covid 
🔥🔥
 
Published: 2021 05 05 04:00:00
Received: 2021 05 05 18:00:17
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
18:00 Exploitation in the time of COVID
🔥🔥
Articles recieved 04/05/2021
Article: Cyber leaders say penetration testing is not foolproof - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95129-cyber-leaders-say-penetration-testing-is-not-foolproof 
🔥🔥
 
Published: 2021 05 04 04:00:00
Received: 2021 05 04 15:00:17
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Cyber leaders say penetration testing is not full proof - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/95129-cyber-leaders-say-penetration-testing-is-not-full-proof 
🔥🔥
 
Published: 2021 05 04 04:00:00
Received: 2021 05 04 05:00:16
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
15:00 Cyber leaders say penetration testing is not foolproof
🔥🔥
05:00 Cyber leaders say penetration testing is not full proof
🔥🔥
Articles recieved 27/04/2021
Article: 61% of organizations were infected with ransomware in 2020 - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/95096-of-organizations-were-infected-with-ransomware-in-2020 
🔥🔥
 
Published: 2021 04 27 15:07:00
Received: 2021 04 27 16:00:12
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
16:00 61% of organizations were infected with ransomware in 2020
🔥🔥
Articles recieved 25/04/2021
Article: Every breath you take, they’ll be watching you - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/93798-every-breath-you-take-theyll-be-watching-you 
🔥🔥
 
Published: 2020 11 01 04:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: In pursuit of diversity - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/93799-in-pursuit-of-diversity 
🔥🔥
 
Published: 2020 11 01 04:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Put your cybersecurity skills to the test in a virtual battlefield - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/93859-put-your-cybersecurity-skills-to-the-test-in-a-virtual-battlefield 
🔥🔥
 
Published: 2020 11 06 15:07:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: US Cyber Command-sponsored cyber exercise will focus on critical infrastructure - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/93876-us-cyber-command-sponsored-cyber-exercise-will-focus-on-critical-infrastructure 
🔥🔥
 
Published: 2020 11 09 16:25:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Deepfakes could compromise your company’s security - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/93476-deepfakes-could-compromise-your-companys-security 
🔥🔥
 
Published: 2020 11 12 07:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Mind the gap: Diversity & other challenges in the age of AI - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/94051-mind-the-gap-diversity-other-challenges-in-the-age-of-ai 
🔥🔥
 
Published: 2020 12 01 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Securing all that data from your physical security and IT systems - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/93760-securing-all-that-data-from-your-physical-security-and-it-systems 
🔥🔥
 
Published: 2020 12 07 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Information as a barrier to progress: aligning infosec goals with business needs - published about 4 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/94101-information-as-a-barrier-to-progress-aligning-infosec-goals-with-business-needs 
🔥🔥
 
Published: 2020 12 07 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Consider these credentials when hiring a ransomware negotiator - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/93919-consider-these-credentials-when-hiring-a-ransomware-negotiator 
🔥🔥
 
Published: 2020 12 08 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Tackling complacency in the GSOC - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/94149-tackling-complacency-in-the-gsoc 
🔥🔥
 
Published: 2020 12 14 13:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: A first-hand account of ransomware: To pay or not to pay - published about 4 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/94180-a-first-hand-account-of-ransomware-to-pay-or-not-to-pay 
🔥🔥
 
Published: 2020 12 17 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: How to use publicly available information to support enterprise security - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/93934-how-to-use-publicly-available-information-to-support-enterprise-security 
🔥🔥
 
Published: 2020 12 22 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Future-proofing data against hackers - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/93825-future-proofing-data-against-hackers 
🔥🔥
 
Published: 2020 12 23 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Power management: The next frontier in securing your enterprise - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/93869-power-management-the-next-frontier-in-securing-your-enterprise 
🔥🔥
 
Published: 2020 12 29 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: The art of targeted phishing: How not to get hooked - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/94265-the-art-of-targeted-phishing-how-not-to-get-hooked 
🔥🔥
 
Published: 2021 01 01 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Use threat hunting to anticipate the unknown - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/94080-use-threat-hunting-to-anticipate-the-unknown 
🔥🔥
 
Published: 2021 01 08 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Five key benefits of privileged access management - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/94019-five-key-benefits-of-privileged-access-management 
🔥🔥
 
Published: 2021 01 12 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: CISOs of small and medium enterprises need to rethink cybersecurity strategy - published about 4 years ago.
Content:
https://www.securitymagazine.com/articles/94417-cisos-of-small-and-medium-enterprises-need-to-rethink-cybersecurity-strategy 
🔥🔥
 
Published: 2021 01 25 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: In the shadow of SolarWinds: Personal reflections - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/94488-in-the-shadow-of-solarwinds-personal-reflections 
🔥🔥
 
Published: 2021 02 01 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: How cybercriminals use sales best practices in ransomware attacks - published almost 4 years ago.
Content:
https://www.securitymagazine.com/blogs/14-security-blog/post/94392-how-cybercriminals-use-sales-best-practices-in-ransomware-attacks 
🔥🔥
 
Published: 2021 02 21 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Goldman Sachs joins not-for-profit TCG to define security measures and standards within FinTech - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/94653-goldman-sachs-joins-not-for-profit-tcg-to-define-security-measures-and-standards-within-fintech 
🔥🔥
 
Published: 2021 02 22 15:59:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Highly skilled & well-funded: The new booming threat in cybercrime - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/94722-highly-skilled-well-funded-the-new-booming-threat-in-cybercrime 
🔥🔥
 
Published: 2021 03 01 05:00:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: WSJ Executive Forum: Advancing security in the new business environment - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/94734-wsj-executive-forum-advancing-security-in-the-new-business-environment 
🔥🔥
 
Published: 2021 05 04 13:10:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: System security: The key to optimal healthcare - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/94562-system-security-the-key-to-optimal-healthcare 
🔥🔥
 
Published: 2021 03 11 05:00:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Defeating password spraying attacks - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/94501-defeating-password-spraying-attacks 
🔥🔥
 
Published: 2021 03 23 04:00:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Mission-critical supply chain software: A growing operational priority - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/94936-mission-critical-supply-chain-software-a-growing-operational-priority 
🔥🔥
 
Published: 2021 04 01 10:00:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Academic study highlights 100% rise in nation state attacks over three years - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/94995-academic-study-highlights-100-rise-in-nation-state-attacks-over-three-years 
🔥🔥
 
Published: 2021 04 09 14:10:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Educational organizations are hit by phishing attacks targeting cloud data more than any other vertical - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/95009-educational-organizations-are-hit-by-phishing-attacks-targeting-cloud-data-more-than-any-other-vertical 
🔥🔥
 
Published: 2021 04 13 14:47:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Rethinking cybersecurity in the age of COVID: The "Dos and Don'ts" of protection - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/94799-rethinking-cybersecurity-in-the-age-of-covid-the-dos-and-donts-of-protection 
🔥🔥
 
Published: 2021 04 22 04:00:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: Personalization and behavior modeling: a new approach to security training - published almost 4 years ago.
Content:
https://www.securitymagazine.com/articles/94695-personalization-and-behavior-modeling-a-new-approach-to-security-training 
🔥🔥
 
Published: 2021 04 23 04:00:00
Received: 2021 04 25 02:14:05
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
02:14 Every breath you take, they’ll be watching you
🔥🔥
02:14 In pursuit of diversity
🔥🔥
02:14 Put your cybersecurity skills to the test in a virtual battlefield
🔥🔥
02:14 US Cyber Command-sponsored cyber exercise will focus on critical infrastructure
🔥🔥
02:14 Deepfakes could compromise your company’s security
🔥🔥
02:14 Mind the gap: Diversity & other challenges in the age of AI
🔥🔥
02:14 Securing all that data from your physical security and IT systems
🔥🔥
02:14 Information as a barrier to progress: aligning infosec goals with business needs
🔥🔥
02:14 Consider these credentials when hiring a ransomware negotiator
🔥🔥
02:14 Tackling complacency in the GSOC
🔥🔥
02:14 A first-hand account of ransomware: To pay or not to pay
🔥🔥
02:14 How to use publicly available information to support enterprise security
🔥🔥
02:14 Future-proofing data against hackers
🔥🔥
02:14 Power management: The next frontier in securing your enterprise
🔥🔥
02:14 The art of targeted phishing: How not to get hooked
🔥🔥
02:14 Use threat hunting to anticipate the unknown
🔥🔥
02:14 Five key benefits of privileged access management
🔥🔥
02:14 CISOs of small and medium enterprises need to rethink cybersecurity strategy
🔥🔥
02:14 In the shadow of SolarWinds: Personal reflections
🔥🔥
02:14 How cybercriminals use sales best practices in ransomware attacks
🔥🔥
02:14 Goldman Sachs joins not-for-profit TCG to define security measures and standards within FinTech
🔥🔥
02:14 Highly skilled & well-funded: The new booming threat in cybercrime
🔥🔥
02:14 WSJ Executive Forum: Advancing security in the new business environment
🔥🔥
02:14 System security: The key to optimal healthcare
🔥🔥
02:14 Defeating password spraying attacks
🔥🔥
02:14 Mission-critical supply chain software: A growing operational priority
🔥🔥
02:14 Academic study highlights 100% rise in nation state attacks over three years
🔥🔥
02:14 Educational organizations are hit by phishing attacks targeting cloud data more than any other vertical
🔥🔥
02:14 Rethinking cybersecurity in the age of COVID: The "Dos and Don'ts" of protection
🔥🔥
02:14 Personalization and behavior modeling: a new approach to security training
🔥🔥
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 143
  • "Home" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Authors is the most poorly serviced field in the articles we see from cyber security news providers.
  • Only Published Date selections use the articles Published Date (for ordering and grouping).
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • Return to the top of this page "Go Now"

Custom HTML Block

Click to Open Code Editor