Category: Cyber Defense Magazine

How Ransomware Jeopardizes Healthcare Organizations

Security challenges in the healthcare sector continue to grow as connected assets and attack surfaces expand. Organizations in any sector face financial ramifications in the aftermath of a successful attack,… The post How Ransomware Jeopardizes Healthcare Organizations appeared first on…

High Performance Software Defined Receivers

Introduction As cybersecurity challenges grow more complex, the tools we use to protect data and communications are also advancing. Among these tools, high-performance software defined receivers (SDRs) with tuning ranges… The post High Performance Software Defined Receivers appeared first on…

Biometrics in the Cyber World

by Victoria Hargrove, Reporter, CDM In today’s society, digital threats are happening at a consistent and concerning rate. Traditional authentication methods no longer stand a chance against preventing these threats…. The post Biometrics in the Cyber World appeared first on…

5 Essential Features of an Effective Malware Sandbox

Malware sandboxes offer a safe and controlled environment to analyze potentially harmful software and URLs. However, not all sandboxes incorporate features that are essential for proper analysis. Let’s look at… The post 5 Essential Features of an Effective Malware Sandbox…

How to maximize cybersecurity ROI

Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf of Cynet in October 2024…. The post How to maximize cybersecurity ROI appeared first on…

Innovator Spotlight: Push Security

Identity is the new perimeter. Attackers are no longer hacking into your organization—they’re logging in with compromised credentials. Push Security is countering this shift with a browser-based identity security platform… The post Innovator Spotlight: Push Security appeared first on Cyber…

The AT&T Phone Records Stolen

In today’s digital age, the importance of cybersecurity must be re-balanced. With increasing cyberattacks and data breaches, organizations must prioritize protecting their customers’ sensitive information. Unfortunately, AT&T has recently fallen… The post The AT&T Phone Records Stolen appeared first on…

Cyber Threat Intelligence (CTI) for Supply Chain Monitoring

Executive summary Many companies face various risks across their supply chain, which are increasing, especially cyber threats. Studies indicate that nearly all companies have at least one supplier that has… The post Cyber Threat Intelligence (CTI) for Supply Chain Monitoring…

Overcoming Cybersecurity Integration Roadblocks

As a CEO working alongside cybersecurity product companies, I know that integration & the connectors are necessary evil for cyber security products companies. For companies in our industry, seamless, reliable… The post Overcoming Cybersecurity Integration Roadblocks appeared first on Cyber…

Spotlight on Dashlane

Dashlane is the leading enterprise credential manager that secures access and proactively protects against breaches. In an era where painfully simple password spraying and phishing attacks are still the primary… The post Spotlight on Dashlane appeared first on Cyber Defense…

Spotlight on Onyxia

Onyxia’s Cybersecurity Management Platform delivers predictive insights and data intelligence that allow CISOs to gain a complete view of their cybersecurity program performance, achieve organizational compliance, increase security stack efficiency,… The post Spotlight on Onyxia appeared first on Cyber Defense…

Innovator Spotlight: Cloud Range

by Dan K. Anderson CEO, CISO, and vCISO The cybersecurity landscape is rapidly evolving, and so are the tactics of adversaries. According to IBM, the average cost of a data… The post Innovator Spotlight: Cloud Range appeared first on Cyber…

How a CISO Should Brief the Board of Directors

It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply communicate it. Unfortunately, that’s not always the case. This leaves… The post How a CISO Should Brief the Board of…

How Has Video Analytics Enhanced Security and Efficiency?

In recent years, video analytics has significantly transformed the interpretation and utilization of visual data. Through advanced algorithms and artificial intelligence methods, video analytics can perform tasks such as object… The post How Has Video Analytics Enhanced Security and Efficiency?…

The Imperative of Penetration Testing AI Systems

In the modern era of technological advancement, artificial intelligence (AI) is revolutionizing business operations, presenting unparalleled opportunities for efficiency and innovation. However, as AI systems become integral to our business… The post The Imperative of Penetration Testing AI Systems appeared…

Innovator Spotlight: Legit Security

by Dan K. Anderson CEO, CISO, and vCISO With the rise of software supply chain attacks, organizations are under increasing pressure to secure their software development pipelines. According to a… The post Innovator Spotlight: Legit Security appeared first on Cyber…

Securing E-commerce

E-commerce is poised to account for over 20% of global purchases by 2024. This surge is fueled by a confluence of factors: the expansion of online product offerings, consumer pursuit of discounts,… The post Securing E-commerce appeared first on Cyber Defense Magazine.…

Securing E-commerce

E-commerce is poised to account for over 20% of global purchases by 2024. This surge is fueled by a confluence of factors: the expansion of online product offerings, consumer pursuit of discounts,… The post Securing E-commerce appeared first on Cyber Defense Magazine.…

Team-Based Training and the Power of Simulation

In the constantly evolving realm of cybersecurity, it is critical for incident responders to be prepared and effective. As cyber threats grow more complex, the training approaches for these defenders… The post Team-Based Training and the Power of Simulation appeared…

Innovator Spotlight: Interpres Security

In the current cybersecurity landscape, the focus has shifted from merely managing vulnerabilities to strategically orchestrating defenses against targeted threats. Organizations are increasingly struggling to optimize their security posture amidst… The post Innovator Spotlight: Interpres Security appeared first on Cyber…

Innovator Spotlight: Concentric

Data security is more critical than ever as organizations manage vast amounts of sensitive information across cloud and on-premises environments. According to a 2023 report by Varonis, over 53% of… The post Innovator Spotlight: Concentric appeared first on Cyber Defense…

Innovator Spotlight: Keepnet Labs

Keepnet specializes in addressing human factors of security through innovative security awareness training and phishing simulation tools. This article highlights the significant findings of their 2024 Vishing (Voice Phishing) Response… The post Innovator Spotlight: Keepnet Labs appeared first on Cyber…

Zero-Trust Endpoint Security

Zero-Trust Endpoint Security: How a Preventive Approach Can Limit Your Endpoint Attack Surface Endpoint security has become more critical than ever in today’s rapidly evolving threat landscape. As enterprises become… The post Zero-Trust Endpoint Security appeared first on Cyber Defense…

The Unsolvable Problem: XZ and Modern Infrastructure

The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst up at night. The recent XZ backdoor attack is finally… The post The Unsolvable Problem: XZ and Modern Infrastructure appeared…

Publishers Spotlight: Proofpoint

I was thrilled to catch up with Proofpoint top executives, recently, to discuss Proofpoint’s AI-powered solution and critical issues including data leakage and insider risks. In an era where digital… The post Publishers Spotlight: Proofpoint appeared first on Cyber Defense…

AI-Powered Fraud Detection Systems for Enhanced Cybersecurity

Artificial intelligence (AI) has many applications in cybersecurity. Automated fraud detection is one of the most impactful of these use cases. Fraud can be difficult for humans to spot, but… The post AI-Powered Fraud Detection Systems for Enhanced Cybersecurity appeared…

Transforming Security Testing With AI: Benefits and Challenges

Security testing plays a critical role in ensuring that applications are protected against vulnerabilities and attacks. In times when cyber attacks like data breaches and ransomware are rising, security testing… The post Transforming Security Testing With AI: Benefits and Challenges…

NextGen Identity Management

Federal agencies face a pivotal cybersecurity challenge: prevent unauthorized entities from accessing systems and facilities, while granting authorized federal employees and contractors access commensurate with verified need. Two factors complicate… The post NextGen Identity Management appeared first on Cyber Defense…

Strengthening Security

Integrated Governance, Risk, and Compliance Is Critical Business executives in all sectors place a high premium on security in the quickly changing digital landscape of today. Security is no longer… The post Strengthening Security appeared first on Cyber Defense Magazine.…

Innovator Spotlight: Cyberseconomics

In today’s rapidly evolving digital landscape, fear, uncertainty, and doubt have become the dominant emotions for many organizations grappling with cybersecurity. The constant reports of data breaches, ransomware attacks, and… The post Innovator Spotlight: Cyberseconomics appeared first on Cyber Defense…

Innovator Spotlight: Zendata

In today’s digital landscape, data security and privacy have become top priorities for organizations of all sizes. According to a 2023 report by IBM, the average cost of a data… The post Innovator Spotlight: Zendata appeared first on Cyber Defense…

Worried about Insider Risk? Pay More Attention to Offboarding

Discussions of insider risk inevitably conjure images of disgruntled IT employees stealing sensitive data from the comfort of an air-conditioned office. However, insider risk is significantly more complex, and any… The post Worried about Insider Risk? Pay More Attention to…

The Role of Intelligence in Cyber Threat Response

1) The Reality of Cybersecurity Threats and Response As technology develops and digitalization progresses, cybersecurity threats are becoming increasingly diverse and sophisticated. As a result, responding to these cybersecurity threats… The post The Role of Intelligence in Cyber Threat Response…

Innovator Spotlight: Concentric AI

It’s not enough for companies to just discover and monitor sensitive data. They need tools that can proactively fix any security issues to prevent data loss and meet compliance standards…. The post Innovator Spotlight: Concentric AI appeared first on Cyber…

How Automation Can Help Security Policy Optimization

One of the recurring questions we hear from network security leaders is “why aren’t our security policies optimized?” The answer, however, is far from simple. The truth is that a… The post How Automation Can Help Security Policy Optimization appeared…

Unmasking Shadow Apps to Secure Your SaaS Stack

It is a tale almost as old as time: users click download, install, and accept as they adopt new software applications without considering the security implications, or getting approval from… The post Unmasking Shadow Apps to Secure Your SaaS Stack…

Escalating Cyberattacks in the Healthcare Sector

The healthcare sector has become a prime target for cyberattacks, with the frequency and sophistication of these attacks increasing rapidly over the last several months. More than 124 million records were compromised… The post Escalating Cyberattacks in the Healthcare Sector appeared first…

Innovator Spotlight: Zilla Security

by Dan K. Anderson CEO, CISO, and vCISO As organizations grow, managing access to critical systems and ensuring compliance with identity governance and administration (IGA) standards becomes increasingly complex. A… The post Innovator Spotlight: Zilla Security appeared first on Cyber…

Innovator Spotlight: Guardio

Cyber threats are becoming more sophisticated, putting both individuals and businesses at significant risk. The rise in phishing attacks, identity theft, and online fraud highlights the urgent need for accessible… The post Innovator Spotlight: Guardio appeared first on Cyber Defense…

Top Tips and Risks Ahead of the 2024 Olympic Games

As buzz and excitement continues to build around the upcoming 2024 Summer Olympics, it is important to be aware of the potential cyberthreats that often target such large global events. The… The post Top Tips and Risks Ahead of the 2024…

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset… The post The MDR That Sees It All appeared first…

Spotlight on DeepKeep.ai

DeepKeep, the leading provider of AI-Native Trust, Risk, and Security Management (TRiSM), empowers large corporations that rely on AI, GenAI, and LLM technologies to manage risk and protect growth. Our… The post Spotlight on DeepKeep.ai appeared first on Cyber Defense…

Publisher’s Spotlight: Reach Security

The AI-Driven Solution Transforming Cybersecurity Infrastructure by Gary Miliefsky Publisher and Dan K. Anderson vCISO and Writer Reach Security is revolutionizing cybersecurity by introducing the first AI specifically designed to… The post Publisher’s Spotlight: Reach Security appeared first on Cyber…

Innovator Spotlight: Qwiet

The volume of code needed is greater than ever while cycles to produce said code are shrinking. One of the consequences of this is security has become secondary – both… The post Innovator Spotlight: Qwiet appeared first on Cyber Defense…

Innovator Spotlight: ZINAD

In today’s fast-evolving digital landscape, cyber attackers are becoming increasingly creative, targeting the human element as a primary entry point. Research shows that human error accounts for up to 90%… The post Innovator Spotlight: ZINAD appeared first on Cyber Defense…

One Year Later: CISA’s Secure by Design Initiative

In April 2023, the Cybersecurity and Infrastructure Security Agency (CISA) unveiled the Secure by Design initiative, setting a new standard for security across the industry. The initiative urges vendors to create… The post One Year Later: CISA’s Secure by Design Initiative…

Innovator Spotlight: HyperCube

by Pete Green, vCISO, Cybersecurity Consultant and Reporter for CDM Gartner has stated the challenge facing most organizations today: “Boards are now pushing back for improved understanding of what they… The post Innovator Spotlight: HyperCube appeared first on Cyber Defense…

Publishers Spotlight: HackerOne

I was thrilled to catch up with HackerOne during Black Hat USA 2024. The modern threat landscape presents increasingly complex cybersecurity challenges for modern organizations. Emerging technologies, like generative AI,… The post Publishers Spotlight: HackerOne appeared first on Cyber Defense…

The Great Ai Swindle

AI washing, or making inflated or misleading claims about AI capabilities, is nothing new. In some ways it is to be expected when a new disruptive technology hits the limelight…. The post The Great Ai Swindle appeared first on Cyber…