In the ever-evolving landscape of digital security, maintaining trust is paramount. When a Certification Authority (CA) is no longer trusted by browsers like Google, as was demonstrated on June 27th, it… The post How To Navigate Certification Authority Distrust: Preventing Critical…
Category: Cyber Defense Magazine
Protect SAP Supply Chains by Preventing Cyber Attacks
Highly advanced and extremely dangerous cyberattacks are targeting SAP (from the company originally called “System Analysis Program” Development) software supply chains with an alarming increase in frequency. By taking advantage… The post Protect SAP Supply Chains by Preventing Cyber Attacks…
The Traditional Advocates of the Security Perimeter Don’t Want You to Know about Data-Centric Security
In an era defined by continuous media announcements of organizations that have suffered both government and private data breaches and thefts, the security of this invaluable asset has never been… The post The Traditional Advocates of the Security Perimeter Don’t…
Is Platform Engineering a Step Towards Better Governed DevOps?
Since 2010, Puppet’s annual State of DevOps Report has tracked trends in IT, including security and, more recently, the growth of platform engineering. 2024’s edition, which includes the results of a survey… The post Is Platform Engineering a Step Towards Better Governed…
Russia, Apple, And the New Front Line in The Fight for Internet Freedom
Russia’s reputation for suppressing internet freedom and free expression is well documented. VPNs have long had a contentious relationship with the Russian state, and in recent years they have been… The post Russia, Apple, And the New Front Line in…
Best Practices for Effective Privileged Access Management (PAM)
Privileged accounts are highly coveted targets for malicious attackers due to the extensive access they provide. According to the 2024 Verizon Data Breach Investigation Report, nearly 40% of data breaches… The post Best Practices for Effective Privileged Access Management (PAM)…
Securing the OT Stage: NIS2, CRA, and IEC62443 Take Center Spotlight
In the dynamic landscape of Operational Technology (OT), robust cybersecurity measures are paramount. As the digital transformation accelerates, protecting critical infrastructure becomes more challenging. Fortunately, three key standards—NIS2, CRA, and… The post Securing the OT Stage: NIS2, CRA, and IEC62443…
The Urgent Need for Data Minimization Standards
A central principle in many data protection laws around the globe is data minimization. But we are currently facing a serious issue: we don’t have legal clarity on what exactly… The post The Urgent Need for Data Minimization Standards appeared…
Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses
The specter of security vulnerabilities is a constant concern in today’s digital landscape. They’re the hidden pitfalls that can undermine even the most meticulously crafted code. But what if you… The post Four Ways to Harden Your Code Against Security…
Is There a DDoS Attack Ceiling?
Today, it’s rare for a month to pass without reports of new distributed denial-of-service (DDoS) attacks. Lately, geopolitical instability and hacktivist groups (e.g., Anonymous Sudan and NoName057(16)) have driven attacks, and these types of attacks… The post Is There a DDoS Attack Ceiling? appeared first…
Ditch The Cloud Security Labels to Nail Detection and Response
Today’s cloud security categories don’t do practitioners any favors when it comes to identifying the key requirements for detection and response in the cloud. This is because various detection and… The post Ditch The Cloud Security Labels to Nail Detection…
Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure
In an era where we are completely reliant on digital connectivity, the security of our critical infrastructure is paramount. CISA defines 16 sectors of US critical infrastructure; each unique and yet… The post Cybersecurity At the Crossroads: The Role Of Private…
Innovator Spotlight: Fortra
by Dan K. Anderson CEO, CISO, and vCISO As cyber threats grow more sophisticated and frequent, organizations face immense pressure to simplify their security stacks and improve operational efficiency. According… The post Innovator Spotlight: Fortra appeared first on Cyber Defense…
Protect SAP Supply Chains by Preventing Cyber Attacks
Highly advanced and extremely dangerous cyberattacks are targeting SAP (from the company originally called “System Analysis Program” Development) software supply chains with an alarming increase in frequency. By taking advantage… The post Protect SAP Supply Chains by Preventing Cyber Attacks…
Breaking Up with Your Password: Why It’s Time to Move On
Data breaches impacted more than 1 billion users in the first half of 2024, up 409% from this time last year, emphasizing the importance of maintaining stealth cyber hygiene. The truth is, as… The post Breaking Up with Your Password: Why It’s Time…
Big Faces, Big Spend, Low ROI: Why Ad Fraud is Increasingly Damaging Brands
Brands are increasingly seen to be employing familiar and expensive faces to ambassador ad campaigns and new products. However, with an estimated 26% of ad spend lost to ad fraud, businesses are… The post Big Faces, Big Spend, Low ROI: Why Ad…
Beyond Encryption: Advancing Data-in-Use Protection
In the ever-evolving landscape of cryptography, traditional encryption methods safeguarding data at rest and in transit remain foundational to cybersecurity strategies. However, the security of decrypted data actively used within… The post Beyond Encryption: Advancing Data-in-Use Protection appeared first on…
Benefits of Network Monitoring Systems
Maintaining a resilient, secure, and efficient network infrastructure is more important than ever. Network monitoring systems, which encompass both hardware and software tools, play a pivotal role in achieving this… The post Benefits of Network Monitoring Systems appeared first on…
Autonomous, Deterministic Security for Mission-Critical IOT Systems
Mission-Critical Iot Systems: Cybersecurity Principles In creating an effective cybersecurity strategy for IoT systems, software architects examine obstacles that limit the security options for their target systems. To deliver a… The post Autonomous, Deterministic Security for Mission-Critical IOT Systems appeared…
The Unsolvable Problem: XZ and Modern Infrastructure
The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst up at night. The recent XZ backdoor attack is finally… The post The Unsolvable Problem: XZ and Modern Infrastructure appeared…
A Cloud Reality Check for Federal Agencies
The move to cloud is not slowing down – spending by Federal civilian agencies on cloud computing could reach $8.3 billion in Fiscal Year (FY) 2025. But despite years of guidance (from… The post A Cloud Reality Check for Federal Agencies appeared…
A CISO’s Guide to Managing Risk as the World Embraces AI
As Generative AI becomes more deeply integrated into our digital landscape, organizations face a growing need to manage application, technology, and cybersecurity risks effectively. The rapid evolution of AI technology… The post A CISO’s Guide to Managing Risk as the…
Sacumen Advances to the Front Line of Thought Leadership: Accelerates Cybersecurity Integration with Innovative Program
Cyber Defense Magazine Thought Leadership Interview with Nitesh Sinha, Founder and CEO of Sacumen and Praneeth Kudithipudi EVP Sales of Sacumen By Yan Ross, CDM Editor-in-Chief Editor’s Note: Cyber Defense… The post Sacumen Advances to the Front Line of Thought…
Why Manufacturing IT Leaders are Turning to AI-Powered Cybersecurity Training
In the rapidly evolving digital landscape, cybersecurity has emerged as a critical concern, particularly for the manufacturing sector. Recent data highlights a staggering 165% surge in cyber-attack attempts on manufacturing facilities, a… The post Why Manufacturing IT Leaders are Turning to AI-Powered…
BYTE BY BYTE
In an era where digital transformation is reshaping healthcare, dental practices find themselves caught in a perfect storm of cybersecurity vulnerabilities. As ransomware attacks surge across the healthcare sector, dental… The post BYTE BY BYTE appeared first on Cyber Defense…
Steps To Protect Against Cybersecurity Threats During Mergers and Acquisitions
Transactions involving U.S. targets and acquirers continue to represent a substantial percentage of overall deal volume, with U.S. M&A exceeding $1.26 trillion in 2023, according to research from the Harvard Law… The post Steps To Protect Against Cybersecurity Threats During Mergers…
Halting Hackers on the Holidays: Protecting Yourself from Seasonal Cyber Threats
by Gary S. Miliefsky, CISSP, fmDHS Ho-ho-hold on to your data! 🎅 The holiday season is here, bringing cheer, gifts, and…cybercriminals?! That’s right! While you’re decking the halls, hackers are… The post Halting Hackers on the Holidays: Protecting Yourself from…
Preparing for EU AI Act from a Security Perspective
The world’s first artificial intelligence law, the EU AI Act, finally came into effect on 1 Aug 2024, 4 years after it was initially proposed by the European Commission. After… The post Preparing for EU AI Act from a Security…
The Initial Engagement Process for Contracting with a vCISO
Introduction In today’s fast-paced digital world, organizations face a myriad of cybersecurity challenges that demand expert guidance and strategic oversight. Enter the Virtual Chief Information Security Officer (vCISO), a role… The post The Initial Engagement Process for Contracting with a…
Shifting The Focus: From Compliance to Secops In Supply Chain Security
There are two main reasons why supply chain attacks are on the increase. First, there is a general trend of companies outsourcing more critical business functions to external providers, and… The post Shifting The Focus: From Compliance to Secops In…
The Importance of Data Anonymization In Safeguarding Sensitive Legal Information
Several high-profile and global law firms have been under the radar of cyber-security data breaches. For instance, the Mossack Fonseca firm experienced the Panama Papers leak in 2016, exposing sensitive… The post The Importance of Data Anonymization In Safeguarding Sensitive…
The Last Stop: Protecting an NHL Franchise Against Cyberattacks
For the Seattle Kraken, the National Hockey League’s 32nd franchise, maintaining a strong defense off the ice—one that keeps cyber attackers in the penalty box—is just as important as its… The post The Last Stop: Protecting an NHL Franchise Against…
The Evolution of Cloud Strategy: Beyond “Cloud First”
In the rapidly evolving digital landscape, the mantra “Cloud First” is becoming a relic of the past. Today, organizations are recognizing that mere digital transformation does not automatically translate into… The post The Evolution of Cloud Strategy: Beyond “Cloud First”…
Giving a Voice to Future Generations of Female Cybersecurity Leaders
While most organizations today remain aware of the ongoing cybersecurity threats, there is a constant struggle to keep pace with them. Much of this has to do with a lack… The post Giving a Voice to Future Generations of Female…
Supply Chains Make Insider Threat Defense More Complex
Regular insider threats are bad enough — conventional security tools don’t detect them, they know where it’ll hurt to hit, and management doesn’t suspect them. Unfortunately, insider supply chain threats… The post Supply Chains Make Insider Threat Defense More Complex…
Securing AI Models – Risk and Best Practices
Generative AI (Artificial Intelligence) has turned out to be a game changer after the introduction of ChatGPT, DALL-E, Bard, Gemini, GitHub Copilot etc. in 2022 and 2023 [1]. The majority… The post Securing AI Models – Risk and Best Practices…
Innovator Spotlight: Sumo Logic
The rapid adoption of cloud and digital services is driving exponential data growth, creating fragmented visibility and operational silos across Dev, Sec, and Ops teams. According to the IDC, the… The post Innovator Spotlight: Sumo Logic appeared first on Cyber…
Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations
In today’s dynamic threat landscape, security leaders are under constant pressure to make informed choices about which solutions and strategies they employ to protect their organizations. The “MITRE Engenuity ATT&CK Evaluations:… The post Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations…
Greater Security for Small Businesses: Why Do SMEs Need a SIEM System?
Recently, the number of cyber attacks has been increasing steadily. It’s important to bear in mind that the more software and hardware the corporate infrastructure contains, the higher the chance… The post Greater Security for Small Businesses: Why Do SMEs…
Perimeter Security Is at the Forefront of Industry 4.0 Revolution
Perimeter security can be defined as the measures and systems which are deployed in order to protect a physical space from intrusion, unauthorized access or any kind of security breaches…. The post Perimeter Security Is at the Forefront of Industry…
New Levels, New Devils: The Multifaceted Extortion Tactics Keeping Ransomware Alive
Having evolved from a basic premise of locking down a victim’s data with encryption, then demanding a ransom for its release, research now suggests that ransomware will cost around $265… The post New Levels, New Devils: The Multifaceted Extortion Tactics…
Navigating the Complexities of AI in Content Creation and Cybersecurity
As AI technology continues to evolve, its integration into various business sectors like content creation is expanding. AI’s capabilities can significantly enhance marketing and business strategies but also present unique… The post Navigating the Complexities of AI in Content Creation…
Maintaining File Security While Working Remotely
These days remote workers in home offices using residential WiFi must maintain a similar security posture as a full-on corporation while working with other remote stakeholders, clients, and partners anywhere… The post Maintaining File Security While Working Remotely appeared first…
Mitigating the Risk of Cybercrime While Traveling Abroad
Global tourism is reaching pre-pandemic records and many people are eager to embark on a new adventure. Yet at the same time, incidents of cybercrimes are increasing at a staggering… The post Mitigating the Risk of Cybercrime While Traveling Abroad…
Modern Phishing Challenges and the Browser Security Strategies to Combat Them
In today’s landscape of advanced phishing attacks, which leverage legitimate domains and sophisticated tactics to evade traditional security measures, it is imperative for organizations to bolster their digital defenses. Browser… The post Modern Phishing Challenges and the Browser Security Strategies…
Illegal Crypto Mining: How Businesses Can Prevent Themselves From Being ‘Cryptojacked’
The popularity of cryptocurrencies like Ethereum and Bitcoin surged during the pandemic era. What began as a niche, almost novelty form of payment in the 2010s, transformed into a legitimate… The post Illegal Crypto Mining: How Businesses Can Prevent Themselves…
How Ransomware Jeopardizes Healthcare Organizations
Security challenges in the healthcare sector continue to grow as connected assets and attack surfaces expand. Organizations in any sector face financial ramifications in the aftermath of a successful attack,… The post How Ransomware Jeopardizes Healthcare Organizations appeared first on…
High Performance Software Defined Receivers
Introduction As cybersecurity challenges grow more complex, the tools we use to protect data and communications are also advancing. Among these tools, high-performance software defined receivers (SDRs) with tuning ranges… The post High Performance Software Defined Receivers appeared first on…
The Future of Cybersecurity: Predictions for 2025 and Beyond
by Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure to meet with many of the market leaders and innovators… The post The Future of Cybersecurity: Predictions for 2025 and…
Guarding the Games: Cybersecurity and the 2024 Summer Olympics
As Paris prepares to host the 2024 Summer Olympic Games, athletes from around the world converge to represent their country. But beyond the cheers and medals lies a digital underworld…. The post Guarding the Games: Cybersecurity and the 2024 Summer…
Fortifying the Future: AI Security Is The Cornerstone Of The AI And GenAI Ecosystem
The rapid proliferation of AI technologies is bringing about significant advancements, but it has also introduced a wide range of security challenges. Large language models (LLMs) and computer vision models,… The post Fortifying the Future: AI Security Is The Cornerstone…
Biometrics in the Cyber World
by Victoria Hargrove, Reporter, CDM In today’s society, digital threats are happening at a consistent and concerning rate. Traditional authentication methods no longer stand a chance against preventing these threats…. The post Biometrics in the Cyber World appeared first on…
5 Essential Features of an Effective Malware Sandbox
Malware sandboxes offer a safe and controlled environment to analyze potentially harmful software and URLs. However, not all sandboxes incorporate features that are essential for proper analysis. Let’s look at… The post 5 Essential Features of an Effective Malware Sandbox…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
Embracing Proactive Fraud Management with Real-Time Orchestration
With security breaches becoming more frequent, banks need to act swiftly to protect their users. The rapid advancement of technology, including real-time payments and AI, adds complexity to the tasks… The post Embracing Proactive Fraud Management with Real-Time Orchestration appeared…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
DNS Security Strategies: Protecting Against Ransomware, Botnets, And Data Theft
Protecting against the growing spectrum of cyber threats, including ransomware, botnets, and data theft, is fundamental for ensuring strong cybersecurity measures. DNS can be used within such a defense strategy… The post DNS Security Strategies: Protecting Against Ransomware, Botnets, And…
Data Breaches are a Dime a Dozen: It’s Time for a New Cybersecurity Paradigm
Data breaches have accelerated quickly in 2024. Google ‘data breach’ and you’re in for a whirlwind of high-profile names scattered across headlines of thousands, and sometimes millions, of customer and… The post Data Breaches are a Dime a Dozen: It’s…
Uncovering the Gaps in Cyberthreat Detection & the Hidden Weaknesses of SIEM
Cybersecurity tools and technologies are continuously being developed and refined to keep pace with the growing threat landscape. One tool we’re all familiar with is the Security Information and Event… The post Uncovering the Gaps in Cyberthreat Detection & the…
How to maximize cybersecurity ROI
Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf of Cynet in October 2024…. The post How to maximize cybersecurity ROI appeared first on…
Innovator Spotlight: Push Security
Identity is the new perimeter. Attackers are no longer hacking into your organization—they’re logging in with compromised credentials. Push Security is countering this shift with a browser-based identity security platform… The post Innovator Spotlight: Push Security appeared first on Cyber…
The AT&T Phone Records Stolen
In today’s digital age, the importance of cybersecurity must be re-balanced. With increasing cyberattacks and data breaches, organizations must prioritize protecting their customers’ sensitive information. Unfortunately, AT&T has recently fallen… The post The AT&T Phone Records Stolen appeared first on…
Cyber Risks for Government Agencies Are on the Rise. Why Security Is Still an Uphill Battle
State and local government and education organizations (also known as SLED) were always at risk from cyberattacks, but the rise of generative AI has increased those risks significantly. Attackers are far more… The post Cyber Risks for Government Agencies Are on the…
Cyber Threat Intelligence (CTI) for Supply Chain Monitoring
Executive summary Many companies face various risks across their supply chain, which are increasing, especially cyber threats. Studies indicate that nearly all companies have at least one supplier that has… The post Cyber Threat Intelligence (CTI) for Supply Chain Monitoring…
Overcoming Cybersecurity Integration Roadblocks
As a CEO working alongside cybersecurity product companies, I know that integration & the connectors are necessary evil for cyber security products companies. For companies in our industry, seamless, reliable… The post Overcoming Cybersecurity Integration Roadblocks appeared first on Cyber…
Spotlight on Dashlane
Dashlane is the leading enterprise credential manager that secures access and proactively protects against breaches. In an era where painfully simple password spraying and phishing attacks are still the primary… The post Spotlight on Dashlane appeared first on Cyber Defense…
Spotlight on Onyxia
Onyxia’s Cybersecurity Management Platform delivers predictive insights and data intelligence that allow CISOs to gain a complete view of their cybersecurity program performance, achieve organizational compliance, increase security stack efficiency,… The post Spotlight on Onyxia appeared first on Cyber Defense…
Why Did Snowflake Have a Target on It? Handling Data Warehouse Security Risks
In early June, the Ticketmaster breach brought widespread attention to the fact that Snowflake accounts did not require multi-factor authentication (MFA) and some were compromised as a result. If only… The post Why Did Snowflake Have a Target on It?…
Building Resilience: A Post-Breach Security Strategy for Any Organization
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to significantly enhance their security posture. Drawing from my experience as… The post Building Resilience: A Post-Breach Security Strategy for Any…
Innovator Spotlight: Cloud Range
by Dan K. Anderson CEO, CISO, and vCISO The cybersecurity landscape is rapidly evolving, and so are the tactics of adversaries. According to IBM, the average cost of a data… The post Innovator Spotlight: Cloud Range appeared first on Cyber…
How a CISO Should Brief the Board of Directors
It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply communicate it. Unfortunately, that’s not always the case. This leaves… The post How a CISO Should Brief the Board of…
How Has Video Analytics Enhanced Security and Efficiency?
In recent years, video analytics has significantly transformed the interpretation and utilization of visual data. Through advanced algorithms and artificial intelligence methods, video analytics can perform tasks such as object… The post How Has Video Analytics Enhanced Security and Efficiency?…
The Imperative of Penetration Testing AI Systems
In the modern era of technological advancement, artificial intelligence (AI) is revolutionizing business operations, presenting unparalleled opportunities for efficiency and innovation. However, as AI systems become integral to our business… The post The Imperative of Penetration Testing AI Systems appeared…
Innovator Spotlight: Legit Security
by Dan K. Anderson CEO, CISO, and vCISO With the rise of software supply chain attacks, organizations are under increasing pressure to secure their software development pipelines. According to a… The post Innovator Spotlight: Legit Security appeared first on Cyber…
Safeguarding Corporate Secrets: Best Practices and Advanced Solutions
Do you know where all the secrets are? The probable answer to this might be NO and believe me you are not alone. The advancement of technology has overtaken us…. The post Safeguarding Corporate Secrets: Best Practices and Advanced Solutions…
The 3 Questions at the Core of Every Cybersecurity Compliance Mandate
Cybersecurity compliance is undergoing a massive shift, with regulatory frameworks rapidly introducing more complex rules, stricter enforcement, and tougher penalties for non-compliance. We see this exemplified through the vast reach… The post The 3 Questions at the Core of Every…
Securing E-commerce
E-commerce is poised to account for over 20% of global purchases by 2024. This surge is fueled by a confluence of factors: the expansion of online product offerings, consumer pursuit of discounts,… The post Securing E-commerce appeared first on Cyber Defense Magazine.…
Securing E-commerce
E-commerce is poised to account for over 20% of global purchases by 2024. This surge is fueled by a confluence of factors: the expansion of online product offerings, consumer pursuit of discounts,… The post Securing E-commerce appeared first on Cyber Defense Magazine.…
Team-Based Training and the Power of Simulation
In the constantly evolving realm of cybersecurity, it is critical for incident responders to be prepared and effective. As cyber threats grow more complex, the training approaches for these defenders… The post Team-Based Training and the Power of Simulation appeared…
Innovator Spotlight: Interpres Security
In the current cybersecurity landscape, the focus has shifted from merely managing vulnerabilities to strategically orchestrating defenses against targeted threats. Organizations are increasingly struggling to optimize their security posture amidst… The post Innovator Spotlight: Interpres Security appeared first on Cyber…
Innovator Spotlight: Concentric
Data security is more critical than ever as organizations manage vast amounts of sensitive information across cloud and on-premises environments. According to a 2023 report by Varonis, over 53% of… The post Innovator Spotlight: Concentric appeared first on Cyber Defense…
Innovator Spotlight: Keepnet Labs
Keepnet specializes in addressing human factors of security through innovative security awareness training and phishing simulation tools. This article highlights the significant findings of their 2024 Vishing (Voice Phishing) Response… The post Innovator Spotlight: Keepnet Labs appeared first on Cyber…
The Ugly Truth about Your Software Vendor which CISOs Won’t Want (But Do Need) to Hear
We’ve got a hard truth to share with you, and you might not like it: You are not your software vendor’s top priority. Your vendor is focused on their own… The post The Ugly Truth about Your Software Vendor which…
Zero-Trust Endpoint Security
Zero-Trust Endpoint Security: How a Preventive Approach Can Limit Your Endpoint Attack Surface Endpoint security has become more critical than ever in today’s rapidly evolving threat landscape. As enterprises become… The post Zero-Trust Endpoint Security appeared first on Cyber Defense…