Category: Cyber Defense Magazine

Top 100 Women in Cybersecurity

Abbott Ekta Sirwani https://www.linkedin.com/in/ekta-sirwani/ Absolute Christy Wyatt https://www.linkedin.com/in/christywyatt/ Alert Logic Sydna Kelley https://www.linkedin.com/in/sydnakelley/ Alta Associates Joyce Brocaglia https://www.linkedin.com/in/joycebrocaglia/ AppEsteem Corporation Hong Jai https://www.linkedin.com/in/hong-jia-02234654/ Assurant Marilyn Piccolo https://www.linkedin.com/in/marilyn-piccolo-777a728/ Attivo Networks Sarah […] The post Top 100 Women in Cybersecurity appeared first…

User Behavior Analytics in Case Management

By Milica D. Djekic, Independent Researcher from Subotica,  the Republic of Serbia. Abstract: Some criminology studies suggest crime can be committed by coping with some schemes, plans or patterns as […] The post User Behavior Analytics in Case Management appeared…

Top 100 Cybersecurity Startups

  10dot https://10dot.com/ Acronis https://www.acronis.com/ Alertot https://www.alertot.com/ Aqua https://www.aquasec.com/ Argus Security https://www.argussecurity.it/ Augmenta Cyber Security https://augcyba.com/ Auth0 https://auth0.com/ Authomize https://www.authomize.com/ Axis Security https://www.axissecurity.com/ Axonius https://www.axonius.com/ Axur https://axur.com/ Balbix https://www.balbix.com/ Black […] The post Top 100 Cybersecurity Startups appeared first on…

Top 100 CISOs

  These CISOs competed against thousands of candidates for this prestigious award.  Judges look at these candidates, searching for the most innovative, with unparalleled success in communicating with their boards […] The post Top 100 CISOs appeared first on Cyber…

Understand And Reduce The Sap Attack Surface

By Christoph Nagy, CEO & Co-Founder, SecurityBridge Knowing the attack surface in today’s world is very important to reduce the risk of exploitation of the so-called unknown-unknown. Zero days are […] The post Understand And Reduce The Sap Attack Surface…

The Quantum Threat: Our Government Knows More Than You Do

By Skip Sanzeri, COO and Founder, QuSecure, Inc. Quantum computers are extremely powerful machines that utilize subatomic properties providing amazing potential to change the way that we process information and […] The post The Quantum Threat: Our Government Knows More…

The Psychology Behind Spear Phishing Scams

By Dr. Yvonne Bernard, CTO, Hornetsecurity Criminals are increasingly using fake emails to exploit their victims for financial gain and are using spear phishing takes the well-known social engineering scam […] The post The Psychology Behind Spear Phishing Scams appeared…

The Benefits of eBPF for API Security

By Sanjay Nagaraj, Co-Founder & CTO of Traceable AI You might hear the term “eBPF” mentioned when chatting to DevOps and DevSecOps folks about network, infrastructure or security management. eBPF […] The post The Benefits of eBPF for API Security…

Table Stakes Security Services for 2023

By Jim Mundy, Director of Security Operations, Segra Most business owners may be aware of cybersecurity defenses such as firewall, DDoS prevention, or various endpoint protection solutions, and assume some […] The post Table Stakes Security Services for 2023 appeared…

NetFlow’s Dirty Little Secret

By Mark Evans, VP Marketing, Endace Many organizations assume their security tools can see everything that happens across the network to detect potential threats. Unfortunately, that’s not the case, for […] The post NetFlow’s Dirty Little Secret appeared first on…

Secure APIs to Drive Digital Business

By Mourad Jaakou, General Manager Amplify at Axway Back in 2010, API Evangelist blogger Kin Lane posited that application programming interfaces (APIs) are driving the Internet and our economy. A […] The post Secure APIs to Drive Digital Business appeared…

Table Stakes Security Services for 2023

By Jim Mundy, Director of Security Operations, Segra Most business owners may be aware of cybersecurity defenses such as firewall, DDoS prevention, or various endpoint protection solutions, and assume some […] The post Table Stakes Security Services for 2023 appeared…

Moola Market Manipulation

Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a non-custodial liquidity protocol operating on the Celo blockchain – suffered […] The post Moola Market Manipulation appeared first on Cyber…

Managing Cybersecurity for Critical National Infrastructure

General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant, Artech, LLC What’s the reality of managing a cybersecurity program […] The post Managing Cybersecurity for Critical National Infrastructure appeared…

Remote Workers Face Growing Threats from Phishing Attacks

Analysis Shows Phishing Strikes Up 61% Over 2021,  With a 50% Increase on Mobile Devices By Patrick Harr, CEO, SlashNext Hybrid offices and BYOD policies have reorganized the workplace forever, […] The post Remote Workers Face Growing Threats from Phishing…

Infrastructure-as-Code Security: a Critical Responsibility

By Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries. Although its principles have been established for over half a […] The post Infrastructure-as-Code Security: a Critical Responsibility appeared first…

How Does a Botnet Attack Work?

By Zac Amos, Features Editor, ReHack Keeping up with cybercriminals is a full-time job, as new attack types appear daily. Cybersecurity analysts must consider botnet attacks among classic ransomware and […] The post How Does a Botnet Attack Work? appeared…

How 5G Networks Are Secured and Enabled By SASE

By Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and environments, there are important deployment and security considerations. While still […] The post How 5G Networks Are Secured and Enabled…

The Rise in Cyber-Attacks from Bad International Actors

There has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems from organizations approaching encryption wrong. By Scott Bledsoe, CEO, Theon Technology […] The post The Rise in Cyber-Attacks from Bad International…

Doenerium: When Stealing from Thieves Is Also a Crime

By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat experts uncovered a particularly worrying and sophisticated phishing attack that […] The post Doenerium: When Stealing from Thieves Is Also…

Five Ways to Keep Endpoint Protection Simple

By Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve. In fact, research shows that 68% of organizations have experienced […] The post Five Ways to Keep Endpoint Protection Simple…

DevSecOps and Digital Transformation: Bridging the Security Gap

How DevSecOps Ensure Security in Development Lifecycle? By Sudeep Srivastava, CEO, Appinventiv The Covid-19 pandemic has accelerated digital transformation to a staggering speed. However, for most organizations going digital has […] The post DevSecOps and Digital Transformation: Bridging the Security…

Applying the NIST Framework to Ransomware Risk Management

Top Takeaways for Preparing for and Managing a Ransomware Attack with NISTIR 8374 By Gil Kirkpatrick, Microsoft MVP […] The post Applying the NIST Framework to Ransomware Risk Management appeared first on Cyber Defense Magazine. This article has been indexed…

Cyber Threats Driving Insurance Claims Activity

By Scott Sayce, Global Head of Cyber and Group Head of the Cyber Centre of Competence at Allianz […] The post Cyber Threats Driving Insurance Claims Activity appeared first on Cyber Defense Magazine. This article has been indexed from Cyber…

5 Ways to Protect Your Workplace from Cybersecurity Threats

By Nicole Allen, Senior Marketing Executive, Salt Communications. The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving […] The post 5 Ways to Protect Your Workplace from Cybersecurity Threats appeared first on Cyber Defense Magazine. This article has been…

AI Is the Answer To Modern Cybersecurity Threats

Why embracing AI solutions is key to combatting evolving cyber threats across many sectors. By Ralph Chammah, CEO, […] The post AI Is the Answer To Modern Cybersecurity Threats appeared first on Cyber Defense Magazine. This article has been indexed…

Zero Trust is More Than a Buzzword

Five Steps to Data-Centric Zero Trust Architecture That Works By Terry Ray, SVP Data Security GTM, Field CTO […] The post Zero Trust is More Than a Buzzword appeared first on Cyber Defense Magazine. This article has been indexed from…

Data, Privacy, And the Future of Artificial Intelligence

By Michael G. McLaughlin, Associate, Baker, Donelson, Bearman, Caldwell & Berkowitz, PC Data privacy and protection have become […] The post Data, Privacy, And the Future of Artificial Intelligence appeared first on Cyber Defense Magazine. This article has been indexed…

WatchGuard’s 2022 Cybersecurity Prediction Mid-Year Review

By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies Every year, the WatchGuard Threat Labs team releases our annual […] The post WatchGuard’s 2022 Cybersecurity Prediction Mid-Year Review appeared first on Cyber Defense Magazine. This article has been indexed from Cyber…

What we can learn from The Undeclared War

By Nicole Allen, Senior Marketing Executive at Salt Communications The Undeclared War, a drama series on Channel 4, […] The post What we can learn from The Undeclared War appeared first on Cyber Defense Magazine. This article has been indexed…