By Rom Hendler, CEO and Co-Founder of Trustifi We live in amazing times, when advanced AI-based text generating engines like ChatGPT can scan the Internet for information and create an […] The post Why It Will Take Sophisticated AI Solutions…
Category: Cyber Defense Magazine
1020 Cyber Security Professionals’ Actions and Experiences When Applying for A New Role.
By Torquil Macleod, Founder and Director of Via Resource At Via Resource, we strive to provide a supportive service to our candidates and clients. As the world shifts and everyone […] The post 1020 Cyber Security Professionals’ Actions and Experiences…
Closing The Cyber Marketing Gap with Investors
Positioning security as a stakeholder value proposition By Patrick Kehoe, Chief Marketing Officer at Coalfire With breaches and shutdowns making daily headlines, no one wants to do business anymore with […] The post Closing The Cyber Marketing Gap with Investors…
Stopping Criminals from Profiting Off Malware Requires a New Approach
By CW Walker, Director, Security Product Strategy at SpyCloud The first three quarters of 2022 saw the total detection of over 62.29 million new types of malware – approximately 228,000 new threats […] The post Stopping Criminals from Profiting Off Malware Requires…
The Data Dilemma: Balancing Business Growth and Security
By Noah Johnson, Co-Founder & CTO of Dasera In today’s digital age, data is the lifeblood of business growth. With large amounts of data sprawled across multiple platforms, companies must […] The post The Data Dilemma: Balancing Business Growth and…
Considering All Returns on a Cybersecurity Compliance Program
By Doug Barbin, Chief Growth Officer and Managing Principal at Schellman C-Suite executives have many variables to consider when they are implementing changes or making investments at an enterprise level. […] The post Considering All Returns on a Cybersecurity Compliance…
Secure Enterprise Collaboration Tools Are Critical in Light of Remote Work and Cyber-Attacks.
By Allen Drennan, Principal and Co-Founder of Cordoniq Cyberattacks escalated in 2022 as critical industries remain a frequent target of cybercriminals. New data from Check Point Research revealed that global […] The post Secure Enterprise Collaboration Tools Are Critical in…
Risk: Everything Everywhere All at Once
It’s Time to Get Proactive About Risk Reduction By Marc Gaffan, CEO of IONIX The first quarter of 2023 is being dominated by a singular theme, re-thinking risk. We came […] The post Risk: Everything Everywhere All at Once appeared…
Reduce Healthcare Insider Threats with Identity and Access Management
By Zac Amos, Features Editor of ReHack Identity and access management (IAM) refers to the policies, procedures and technologies used to manage and control access to digital resources and systems. […] The post Reduce Healthcare Insider Threats with Identity and…
Ransomware Takes No Prisoners
By Monica Oravcova, COO and Co-Founder of Naoris Protocol The recent Killnet cyberattack that disrupted contact between NATO and military aircraft providing aid to victims of the Turkish-Syrian earthquake, is […] The post Ransomware Takes No Prisoners appeared first on…
Leadership Is Still Washing Their Hands of Cyber Risk
By John A. Smith, CEO of Conversant Group Where it comes to owning responsibility for cyber risk, executive leadership has moved in and out of the spotlight like character actors […] The post Leadership Is Still Washing Their Hands of…
Machine Identity Management: The Key to Managing Compliance Risk in a Multi-Cloud, Multi-Cluster World
By Sitaram Iyer, Senior Director of Cloud Native Solutions at Venafi Financial services may be an industry in which mainframes still do much of the heavy lifting, but increasingly it’s […] The post Machine Identity Management: The Key to Managing…
Protecting Accounting Firms from Cyberattacks
Cybersecurity Practices Must Be A Top Priority For Firms This Busy Season By Alan Hartwell, Chief Technology Officer at IRIS Software Group Financial service firms are a top target for […] The post Protecting Accounting Firms from Cyberattacks appeared first…
New Cyber Threats Calls for New Approaches
By Mark Sincevich, Federal Director of Illumio Data compromises hit record numbers in 2021 with 1,826 occurrences reported, up 23 percent from 2017. In the last two years alone, 66 […] The post New Cyber Threats Calls for New Approaches…
How Must IT Leaders Develop Contingency Plans to Combat Geopolitical and Environmental Risks?
By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights In today’s geostrategic context, geopolitics and technology are inextricably linked, but many IT professionals who prioritize digital transformation pay comparably […] The post How Must IT Leaders Develop Contingency Plans…
How the Increasing IT Talent Gap is Impacting the Cybersecurity Industry
By Pete Sorensen, VP of Strategic Initiatives of ConnectWise In the rapidly evolving digital landscape, technology solution providers (TSPs) are having to deal with an unprecedented number of staff vacancies […] The post How the Increasing IT Talent Gap is…
Stop Backing Up Ransomware
By James Gorman, Cyber Security Expert and Entrepreneur When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for the cloud environment. However, having […] The post Stop Backing Up Ransomware appeared first on…
Understanding The Concept of Privacy By Design
By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and Privacy Commissioner Ann Cavoukian, is a comprehensive approach to privacy […] The post Understanding The Concept of Privacy By Design…
The Data Challenge: How to Map Data in A Distributed World
By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies Here’s a quick-fire question: do you know where all your sensitive data is? As businesses of all sizes […] The post The Data Challenge: How to Map Data…
Cyberattacks on City and Municipal Governments
Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago. The increase in breaches is likely due to several factors, including the […] The post Cyberattacks on City and Municipal Governments appeared…
Cyber Attack as an Asymmetric Threat
By Milica D. Djekic, Independent Researcher Abstract: Cyberspace is yet unsafe environment for communication and data transfer. Hacker’s organizations can target many servers, datacenters and endpoints relying on capacities of […] The post Cyber Attack as an Asymmetric Threat appeared…
HIPAA-HITECH: Keeping the Compliance Engine Running on a Classic Data Protection Regulation
By Gregory Hoffer, CEO, Coviant Software Everyone knows someone who is a vintage car nut. They keep their baby in the garage during inclement weather and roll it out on […] The post HIPAA-HITECH: Keeping the Compliance Engine Running on…
SIEM for SAP – Log Evaluation to Attack Detection
By Christoph Nagy, CEO of SecurityBridge To detect attacks on SAP, you need to evaluate the security logs in SAP. While many organizations have spent the past few years protecting […] The post SIEM for SAP – Log Evaluation to…
The Cybercrime Blame Game: It’s Time to Unite the Industry Against a Common Enemy.
The need for the cybersecurity industry to work together in order to combat the rising threat of cybercrime. By Brendan Kotze, Chief Executive Officer at Encore When someone breaks into […] The post The Cybercrime Blame Game: It’s Time to…
Collaboration is Key to Building Industrial Cyber Resilience
By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis Specialist at the World Economic Forum`s Centre for Cybersecurity Industries […] The post Collaboration is Key to Building Industrial Cyber…
SAP Debugger’s Power and Danger
By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar where the Service Advertising Protocol (“SAP”) representative explained a recently […] The post SAP Debugger’s Power and Danger appeared first…
Blockchain Startups Are Drawing Substantial Venture Capital Funding
By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights Blockchain technology is becoming more popular owing to the various benefits businesses get from it- supply chain management, decentralized finance, […] The post Blockchain Startups Are Drawing Substantial Venture Capital…
A CEO’s Guide to Not Becoming the Next Cyberattack Headline
By Sheetal Pansare, President & Global CEO of Futurism Technologies Imagine you are a CEO waking up to a Class-action lawsuit simply because your IT department failed to comply with […] The post A CEO’s Guide to Not Becoming the…
Advancements in AI Cybersecurity: Leveraging ChatGPT to Stay Ahead of Cyber Criminals
By Brian Sathianathan, Co-Founder and CTO of Iterate.ai As our world becomes more and more digitized, the threat of cyber-attacks has become increasingly prevalent. The need for strong cybersecurity measures […] The post Advancements in AI Cybersecurity: Leveraging ChatGPT to…
Strengths and Vulnerabilities of AI Applications to Health Care
By Edward Maule, Chief Information Officer and Chief Information Security Officer at Advocare, LLC Artificial intelligence (AI) has made significant advancements in the healthcare sector, and its potential is almost […] The post Strengths and Vulnerabilities of AI Applications to…
2023 Predictions
By Anurag Gurtu, Chief Product Officer at Strike Ready In 2022, the global average total breach cost surpassed $4.35M, and nearly two-thirds of organizations experienced more than one breach. As […] The post 2023 Predictions appeared first on Cyber Defense…
Mastering Patch Management: 10 Essential Best Practices for Optimal Security
What is patch management and why is it important? Software development is a continuous process, whether it involves creating a Windows Server or a simple text editor. Vendors release functional […] The post Mastering Patch Management: 10 Essential Best Practices…
ChatGPT and You
Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer at Sangfor Technologies Okay, I admit the title is clickbait to get you to read this article. […] The post ChatGPT and You appeared first on Cyber…
How To Survive a Ransomware Attack and Fix Ransomware Breach Face
By Derek Nugent, Vice President of Revenue at Difenda Ransomware attacks have become a growing concern for businesses and individuals alike. Each year there are over 236.1 million ransomware attacks […] The post How To Survive a Ransomware Attack and…
Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework
By Kaustubh Medhe, Head of Research and Intelligence at Cyble Cybercriminal motivations rarely change over time. A typical cyberattack is carried out for one of the following reasons – Illicit […] The post Making a Business Case for Cyber Threat…
Security Tool Integration Isn’t Enough Anymore
By Manoj Arora, Founder & CEO, Difenda Organizations today are overwhelmed with options when it comes to security tools and technologies. In the past, best-of-breed security technology meant having the […] The post Security Tool Integration Isn’t Enough Anymore appeared…
Going into the Darknet: How Cynet Lighthouse Services Keep Cybersecurity Teams One Step Ahead of Hackers
By monitoring the darknet, as well as underground forums, Cynet is able to identify and prepare for the latest cybersecurity threats before they reach deafening levels. By Eyal Gruner, Co-Founder […] The post Going into the Darknet: How Cynet Lighthouse…
Enhance Employee Productivity by Adopting a Modern Approach to Password Security
By Joshua Parsons, Product Marketing Manager at Enzoic For decades, enterprise security measures and employee productivity were seemingly at odds. In fact, 37% of respondents in a recent Vanson Bourne […] The post Enhance Employee Productivity by Adopting a Modern…
Complexity is Still the Enemy of Security
Ease of Use, Ease of Integration Encourages Data Protection By Gregory Hoffer, CEO of Coviant Software In 1999 noted cybersecurity expert Bruce Schneier wrote in his Schneier on Security blog […] The post Complexity is Still the Enemy of Security…
Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change.
By Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing their intended job, giving a false sense of security, and causing […] The post Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches…
How to Improve your Security Posture and ROI
By Mark Evans, VP Marketing and Packet Capture Evangelist at Endace Let’s assume your security team has completed all the “low-hanging fruit” security essentials. They’ve made sure all the basic […] The post How to Improve your Security Posture and…
Security Leaders Are Finally Getting a Seat at The Table with Corporate Leadership – Make Good Use of Your Time There.
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security leaders mature their programs. By Robert Herjavec, CEO of Cyderes […] The post Security Leaders Are Finally Getting a Seat…
Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change
by Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing its intended job, giving a false sense of security, and causing […] The post Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches…
ImmuniWeb AI Platform
Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […] The post ImmuniWeb AI Platform appeared first on Cyber…
OT Zero Trust
The Last Frontier to Protect OT Environments By Terence Liu, CEO, TXOne Networks OT Zero Trust – a Device-Centric Methodology In the IT world, the heart of Zero Trust is […] The post OT Zero Trust appeared first on Cyber…
It’s 2023 – You MUST Know The SaaS Applications Your Employees Are Using
Organizations should have free access to their SaaS attack layer By Galit Lubetzky Sharon, Co-Founder & CTO, Wing Security While security budgets were not the first to be impacted by […] The post It’s 2023 – You MUST Know The…
How to Protect Your Ecommerce Site from Cybersecurity Threats
By Karl Pulanco, Product Portfolio Manager, Yondu Modern businesses no longer need a physical store to sell goods and services. All they need now is an eCommerce website to start […] The post How to Protect Your Ecommerce Site from…
2023: What Awaits Us?
By Ashley Stephenson, CTO, Corero Network Security When it comes to cyber security, one thing that 2022 and just about any recent year will be remembered for is the succession […] The post 2023: What Awaits Us? appeared first on…
ChatGPT and You
Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer, Sangfor Technologies Okay, I admit the title is clickbait to get you to read this article. There […] The post ChatGPT and You appeared first on Cyber…
Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
By Tyler Farrar, CISO, Exabeam According to the Exabeam State of the SIEM survey, security professionals remain confident in the face of modernizing adversaries despite rising breach numbers. The survey […] The post Organizations Have Security Priorities Mismatched as Breaches…
The Practical Side of ZTNA: How it Helps Harden Defenses
By Timothy Liu, CTO and co-founder, Hillstone Networks In the cybersecurity world, buzzwords seem proliferate with the changing of the wind. Currently zero-trust network access, or ZTNA, is getting its […] The post The Practical Side of ZTNA: How it…
Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework
By Kaustubh Medhe, Head of Research and Intelligence A recent market survey report (Source: Fortune Business Insights, March 2023) pegged the current market size of the Cyber Threat Intelligence (CTI) […] The post Making a Business Case for Cyber Threat…
Cloud Visibility and Port Spoofing: the “Known Unknown”
By Stephen Goudreault, Cloud Security Evangelist, Gigamon As with all technology, new tools are iterations built on what came before and classic network logging and metrics are no different. The […] The post Cloud Visibility and Port Spoofing: the “Known…
A Question of Doubt
The cyber security crisis of confidence amongst CISOs and CIOs — and how to overcome it. By Gary Penolver, Chief Technology Officer at Quod Orbis I’ve worked closely with CISOs […] The post A Question of Doubt appeared first on…
Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.
By Dan Richings – Senior Vice President, Global Presales, Solutions Engineering, and Support – Adaptiva Using third-party software is unavoidable in today’s market. The competition and the break-neck pace that […] The post Treading Water: The Struggle Against Third-Party Vulnerabilities…
Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security leaders mature their program By Robert Herjavec, CEO, Cyderes The […] The post Security leaders are finally getting a seat…
As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security
By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to determine how adversaries’ strategies are changing from month to month […] The post As Cyber Attacks Target Large Corporates, Teams…
Eight Tips for CISOs Trying Get Their Board on Board
By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role in strategic decision-making in enterprises. Yet CISOs frequently find themselves […] The post Eight Tips for CISOs Trying Get Their…
Next Generation Cybersecurity for Small to Midsize Businesses
How Cynet is giving lean security teams the tools they need to protect their business as budget crunches and reduced headcounts put many companies at risk by By Eyal Gruner, […] The post Next Generation Cybersecurity for Small to Midsize…
Zero Trust in a DevOps World
By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical to securing people, devices, infrastructure, and applications – all of […] The post Zero Trust in a DevOps World appeared…
Why Tackling Financial Crime Calls for A Privacy-First Approach
By Dr. Alon Kaufman, CEO and Co-Founder of Duality Technologies To gain the upper hand in the fight against financial crime, banks and other financial institutions need to share data, […] The post Why Tackling Financial Crime Calls for A…
Why You Can’t Have True Zero Trust Without API Security
By Richard Bird, Chief Security Officer, Traceable Global adoption of Zero Trust security models is soaring and with good reason. Due to organizations’ embrace of digital business models and enablement […] The post Why You Can’t Have True Zero Trust…
There’s no way you’re still using Consumer Messaging Apps for Business
By Nicole Allen, Senior Marketing Executive, Salt Communications Consumer messaging apps are routinely utilised for business purposes even if they were intended for personal usage. However, because of the legal […] The post There’s no way you’re still using Consumer…
Top 5 Questions to Ask When You’re Building a Cloud Security Strategy
By Metin Kortak, chief information security officer, Rhymetec As companies began moving their computing operations and data storage to the cloud, the security of these digital assets has been a […] The post Top 5 Questions to Ask When You’re…
Vulnerability Prioritization is Not a One-Size Fits All Approach
By Victor Gamra, CISSP, Founder and CEO of FortifyData System vulnerabilities are ever increasing as adoption of new and emerging technologies are implemented. Security professionals struggle to keep up with […] The post Vulnerability Prioritization is Not a One-Size Fits…
Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future
By Dr Ali El Kaafarani, Founder and CEO of PQShield July 5th, 2022, marked an important milestone in the fight to secure sensitive data against future cyber-attacks from quantum computers. […] The post Why Businesses Need to Leverage the NIST…
Remaining Proactive at Identifying Risks Keeps You Ahead of Hackers
By Carl Torrence, Content Marketer at Marketing Digest Why is cybersecurity such a big issue in organizations all over the world? It’s simple — Data breaches end up in loss […] The post Remaining Proactive at Identifying Risks Keeps You…
Solving The AppSec Dilemma Across the Entire SDLC
Why organizations should adopt an integrated and continuous approach to application security education By Amy Baker, Security Education Evangelist, Security Journey The software supply chain is under increasing threat. With […] The post Solving The AppSec Dilemma Across the Entire…
The Biggest Cyber Threats For The Financial Industry In 2023
By Ben Herzberg, Chief Scientist of Satori According to external market data, the financial sector was the most attacked in 2022 by DDoS attacks, while the number of all attacks […] The post The Biggest Cyber Threats For The Financial…
The California Consumer Privacy Act (CCPA) and the American Data Privacy Protection Act: The Good, The Bad and The Ugly
By Dr. Eric Cole, Advisor – Theon Technology Since 2018, there has been serious discussion of a new national privacy law promising Americans enhanced data protection, much like the European […] The post The California Consumer Privacy Act (CCPA) and…
“The Impact of Mobile Threats on SMBs: 10 Simple Ways to Empower Your Company.”
By Wendy Taccetta, SVP, Small and Medium Business for Verizon Business The shift in our hybrid and remote working world and the increase in mobile device use allow for a […] The post “The Impact of Mobile Threats on SMBs:…
Securing Collaboration at the Speed of Business
By Ofer Klein, CEO and co-founder, Reco Recent research found that 96% of business leaders believe that effective communication is key to a productive remote or hybrid work. And Slack […] The post Securing Collaboration at the Speed of Business…
Sell tickets to Fans, Not to Bots.
By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase a ticket for an event only to discover they are […] The post Sell tickets to Fans, Not to Bots.…
Product Review of SpecOps Password Policy
Looking for a tool to validate if your Active Directory (AD) passwords are safe across your Enterprise? Why would this be important? There are a few solutions in the industry […] The post Product Review of SpecOps Password Policy appeared…
Lessons From the Uber Hack
By Tomasz Kowalski, CEO and Co-Founder, Secfense For decades, cybersecurity experts have been warning us against weak or stolen passwords. Two-factor authentication (2FA) has always been pointed out as the […] The post Lessons From the Uber Hack appeared first…
Our Nation Needs Comprehensive AI Legislation, And Soon
By Dr. Allen Badeau, Chief Technology Officer, Empower AI The White House recently launched an “AI Bill of Rights” framework to lay the groundwork for the future creation and use […] The post Our Nation Needs Comprehensive AI Legislation, And…
How Zero Trust Enables More Effective Security Management
Moving to Zero Trust Architecture as a standard By Jim Hietala, Vice President of Business Development and Security at The Open Group There’s a huge buzz around Zero Trust in […] The post How Zero Trust Enables More Effective Security…
Industry Experts Share Their Security Predictions for 2023
Insights on the trends all businesses need to look out for By Multiple Authors It’s no surprise that security is a major topic of conversation, with cyberattacks of all kinds […] The post Industry Experts Share Their Security Predictions for…
Making the most of your time at the RSA 2023 conference
Ben Rothke, CISSP, CISM, CISA, is a Senior Information Security Manager at Tapad Going to RSA 2023? Failing to plan is planning to fail. With the RSA 2023 conference starting on April […] The post Making the most of your time at…
Has Adoption of ‘Connected Devices’ Outpaced Security?
By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of connected devices but the speed at which these devices have […] The post Has Adoption of ‘Connected Devices’ Outpaced Security?…
How to Stay GDPR Compliant While Sending Cold Emails
Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important marketing technique for any business that depends on reaching new, […] The post How to Stay GDPR Compliant While Sending…
Europe Envies America’s Cybersecurity Industry. What Can We Learn from It?
Europe’s cyber industry has huge potential. Copying what’s worked in the US is a route to realising that promise. By Carlos Moreira Silva and Carlos Alberto Silva, Managing Partners at […] The post Europe Envies America’s Cybersecurity Industry. What Can…
Expanding Macroeconomic Pressure And Attack Surface Will Drive Security Automation In 2023
By Leonid Belkind, CTO and Co-Founder, Torq Security automation continued to have significant, positive impact across myriad cybersecurity applications in 2022, with enterprises adopting and deploying no-code platforms to significant […] The post Expanding Macroeconomic Pressure And Attack Surface Will…
Cybersecurity: Your Guide to Digital Identity
Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works and why it matters. By Filip Verreth, VP Product Management […] The post Cybersecurity: Your Guide to Digital Identity appeared…
Does Your Company Have a Dark Data Problem?
By Dannie Combs, SVP and Chief Information Security Officer, Donnelley Financial Solutions (DFIN) Don’t let the name fool you: dark data is all too visible — to bad actors, that […] The post Does Your Company Have a Dark Data…
Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush?
By Camellia Chan, CEO & founder of Flexxon I was honored to be one of the representatives from 36 nations, the EU, and private sector companies who convened October 31-November […] The post Can The US-Led Multinational Counterattack Stop Ransomware’s…
Cybersecurity Attacks To Come: Here’s How To Prepare
By Russ Reeder, CEO, Netrix Global Ensuring 100% prevention against all cyberattacks is impossible today, as modern perpetrators find more sophisticated ways to strike by the minute. A strategy focusing […] The post Cybersecurity Attacks To Come: Here’s How To…
Busting Myths Around Cybersecurity Team Training
New Research Results from Omdia and Cybrary Point to Substantial ROI From Continuous Upskilling of Cybersecurity Teams. By Kevin Hanes, CEO, Cybary In recent years, cybersecurity has garnered a staggering […] The post Busting Myths Around Cybersecurity Team Training appeared…
5 Best Practices for a Multi-Factor Authentication (MFA) Strategy
By Zac Amos, Features Editor, ReHack Organizations and individuals must implement multi-factor authentication strategies to enhance any cybersecurity risk management plan. Cyberthreats have always been creative, but increasing attacks requires […] The post 5 Best Practices for a Multi-Factor Authentication…
2023 Predictions
By Dr. Chenxi Wang, Founder and Managing General Partner, Rain Capital For venture capitalists and investors with an eye on technology, 2022 was a chaotic year. This turmoil was partly […] The post 2023 Predictions appeared first on Cyber Defense…
New Threat Report Shows Attackers Increasingly Exploiting MFA Fatigue
By Ben Brigida, Director, Security Operations, Expel If you want to know what’s happening in the cybersecurity world, it helps to have up-to-date information. That means staying on top of […] The post New Threat Report Shows Attackers Increasingly Exploiting…
The Future of Online Privacy
By Mia Naumoska, Chief Marketing Officer at Internxt You’ve probably noticed that there’s a lot of bad news about online privacy these days. Security breaches and data leaks are everywhere, […] The post The Future of Online Privacy appeared first…
Why Ransomware Costs Need to be Prioritized in Your 2023 Budget
By Anurag Lal, CEO and President of NetSfere No one expects a hostage takeover, ever. Businesses never think a ransomware attack could happen to them, and yet it very well […] The post Why Ransomware Costs Need to be Prioritized…
4 Key Security Trends For 2023
By Jonathan Lee, Senior Product Manager, Menlo Security 2022 has unfortunately failed to live up to hopes for calmer waters. While it seems as though the worst effects of the […] The post 4 Key Security Trends For 2023 appeared…
Why Low-Code AI Is Needed Now More Than Ever
By Solomon Ray, Director of Innovation, Strategy, and Special Projects at Iterate.ai As a business leader and executive, a “low-code strategy” may not be on the top of your mind, […] The post Why Low-Code AI Is Needed Now More…
SMB Cyber Insurance: The End of Innocence
By Nadav Arbel, Co-founder & CEO, CYREBRO The cyber insurance landscape has changed dramatically in recent years – for both insurers and policyholders. In many ways, the past two years […] The post SMB Cyber Insurance: The End of Innocence…
Why Power Matters in Cyber Protection
Defending power management equipment in an era of more connectivity By James Martin, Global Connectivity Product Manager, Eaton It’s well understood that as digital evolution continues opening doors for greater […] The post Why Power Matters in Cyber Protection appeared…
Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
By Tyler Farrar, CISO, Exabeam According to the Exabeam State of the SIEM survey, security professionals remain confident in the face of modernizing adversaries despite rising breach numbers. The survey […] The post Organizations Have Security Priorities Mismatched as Breaches…
Why “Point-In-Time” Solutions Are Losing The Battle Against Sophisticated Fraud
By Alisdair Faulkner, CEO at Darwinium Cybersecurity and fraud teams have been locked in a technology arms race with their adversaries for years. Once again, they are on the back […] The post Why “Point-In-Time” Solutions Are Losing The Battle…
Cyber Defense Magazine– PQC & Biometrics
Why biometric security is crucial in a post-quantum world By Nils Gerhardt, Chief Technology Officer for Utimaco Many are saying that passwords have now become obsolete – they can be […] The post Cyber Defense Magazine– PQC & Biometrics appeared…