Category: Cyber Defense Magazine

Innovator Spotlight: DataBee™

The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…

Innovator Spotlight: Reach Security

Despite the increasing number of cybersecurity tools available, attacks continue to succeed at an alarming rate. Studies show that more than 70% of organizations only utilize 20% or less of… The post Innovator Spotlight: Reach Security appeared first on Cyber…

Innovator Spotlight: SecPod

Vulnerability management has become more critical than ever as the global cost of cybercrime is projected to reach $10.5 trillion annually by 2025. In a world where a cyberattack occurs… The post Innovator Spotlight: SecPod appeared first on Cyber Defense…

Innovator Spotlight: Cigent

As organizations increasingly rely on edge devices for data collection and processing, the risk of sensitive data breaches has escalated. The proliferation of traditional and emerging devices, such as IoT,… The post Innovator Spotlight: Cigent appeared first on Cyber Defense…

Innovator Spotlight: ExtraHop

As organizations face an escalating wave of cyberattacks, ransomware remains a top concern, with more than 91% of IT and security decision-makers admitting to having paid at least one ransom… The post Innovator Spotlight: ExtraHop appeared first on Cyber Defense…

Innovator Spotlight: Upwind

The rapid adoption of cloud technology has led to an explosion in complexity and vulnerability within modern infrastructures. In 2022, 45% of businesses reported cloud-based data breaches or failed audits,… The post Innovator Spotlight: Upwind appeared first on Cyber Defense…

Innovator Spotlight: Normalyze

In today’s fast-paced digital world, data breaches have become the norm, not the exception. With data sprawled across cloud, on-prem, and hybrid environments, organizations face critical challenges in maintaining visibility… The post Innovator Spotlight: Normalyze appeared first on Cyber Defense…

Innovator Spotlight: Harmonic Security

The rapid rise of generative AI (GenAI) has brought about both unprecedented opportunities and significant challenges for organizations, particularly in data protection. According to MIT research, 77% of organizations identify… The post Innovator Spotlight: Harmonic Security appeared first on Cyber…

Innovator Spotlight: AppSOC

The rapid adoption of AI and Generative AI applications has unlocked tremendous potential, but it has also introduced significant security risks that enterprises must address. Gartner predicts that by 2025,… The post Innovator Spotlight: AppSOC appeared first on Cyber Defense…

Publisher’s Spotlight: Cyera

I was thrilled to catch up with Cyera during Black Hat USA 2024. Over 90% of the world’s data was created in the last two years – making data the… The post Publisher’s Spotlight: Cyera appeared first on Cyber Defense…

Publisher’s Spotlight: Cranium

I was thrilled to catch up with Cranium during Black Hat USA 2024.  CISOs are feeling pressure from their CEOs and Boards to support these initiatives when they need more… The post Publisher’s Spotlight: Cranium appeared first on Cyber Defense…

Publishers Spotlight: Cranium

I was thrilled to catch up with Cranium during Black Hat USA 2024.  CISOs are feeling pressure from their CEOs and Boards to support these initiatives when they need more… The post Publishers Spotlight: Cranium appeared first on Cyber Defense…

Publishers Spotlight: Bedrock Security

I was thrilled to catch up with Bedrock Security during Black Hat USA 2024.  The surge in data volume from cloud and GenAI initiatives, coupled with escalating threats to enterprises’… The post Publishers Spotlight: Bedrock Security appeared first on Cyber…

The Hidden Threat of Shadow AI

In November 2022, ChatGPT launched, bringing new possibilities and challenges. As AI and GenAI have grown in popularity and use, businesses have had to grapple with how to use the… The post The Hidden Threat of Shadow AI appeared first…

Publishers Spotlight: ForAllSecure

I was thrilled to catch up with ForAllSecure during Black Hat USA 2024.  ForAllSecure is an organization of hackers, developers, and security professionals dedicated to research and innovation in the… The post Publishers Spotlight: ForAllSecure appeared first on Cyber Defense…

Publishers Spotlight: Endari

I was thrilled to catch up with Endari during Black Hat USA 2024.  Endari partners with startups and SMBs to enhance their cybersecurity maturity, integrating proactive security measures into their… The post Publishers Spotlight: Endari appeared first on Cyber Defense…

All-in-One: How Cynet is Revolutionizing Cybersecurity for MSPs

Managed Services Providers (MSPs) are increasingly looking to provide cybersecurity services due to the demand from their current clients. Though the revenue potential is lucrative, the road for many MSPs… The post All-in-One: How Cynet is Revolutionizing Cybersecurity for MSPs…

Internal And External Threat Intelligence

How To Balance the Two Sources In cybersecurity, threat intelligence covers a broad range of activities concerning collection, analysis, and dissemination of information on the current threat landscape. In terms… The post Internal And External Threat Intelligence appeared first on…

How To Respond to The Rise of Banking Trojans

The resurgence of banking trojans has become a major cybersecurity concern for financial institutions and their customers. These malicious backdoor programs continue to evolve and succeed due to their ability… The post How To Respond to The Rise of Banking…

Publishers Spotlight: SquareX

I was thrilled to catch up with SquareX during Black Hat USA 2024. SquareX is a cybersecurity startup that specializes in enhancing browser security and privacy through innovative solutions. The… The post Publishers Spotlight: SquareX appeared first on Cyber Defense…

Publisher’s Spotlight: Syxsense

I was thrilled to catch up with Syxsense during Black Hat USA 2024. Syxsense is a cybersecurity company that provides unified endpoint management and security solutions. The company specializes in… The post Publisher’s Spotlight: Syxsense appeared first on Cyber Defense…

Publishers Spotlight: F5

I was thrilled to catch up with F5 during Black Hat USA 2024. Years ago, when I started an innovative e-commerce company, we used their Big IP product to load… The post Publishers Spotlight: F5 appeared first on Cyber Defense…

Publishers Spotlight: Endace

Fundamental and Foundational to InfoSec and Regulatory Compliance is Capturing all Packets. Figure 1.  Endace High-Performance Packet-capture Appliance Endace specializes in always-on, hybrid-cloud packet capture, addressing the challenge of ensuring… The post Publishers Spotlight: Endace appeared first on Cyber Defense…

Defense in Diversity: A Strategy for Robust Cybersecurity

The concept of “defense in depth” dates back to ancient times, epitomized by the ramparts, draw-bridge, towers, and battlements surrounding a medieval castle.  Cybersecurity’s adaptation of the idea — multiple… The post Defense in Diversity: A Strategy for Robust Cybersecurity…

Publishers Spotlight: DigitalXForce

When I go to BlackHat I’m always looking for cyber innovation across many vectors including cyber resilience artificial intelligence and most importantly compliance. This year I met up with Lalit… The post Publishers Spotlight: DigitalXForce appeared first on Cyber Defense…

Shedding Light on The Dark Web: Enhancing Cybersecurity Through Proactive Monitoring

In the digital age, the dark web has emerged as a clandestine marketplace for illicit activities, including the sale of stolen data, illegal software and various forms of malware. The proliferation of these marketplaces poses significant threats to personal, corporate and national security. As… The post Shedding Light on The Dark Web: Enhancing Cybersecurity…

Maximizing Cybersecurity Impact Within Budget Constraints

Cybersecurity is the cornerstone of organizational stability and resilience today. Despite its critical importance, budgetary allocations often fall short due to competing priorities. Mimecast recently surveyed 1,100 CISOs and information… The post Maximizing Cybersecurity Impact Within Budget Constraints appeared first…

Looking Past DevOps: AI, ClickOps and Platform Engineering

About fifteen years ago, DevOps radically overhauled the world of software engineering. Previously, the development process had been defined by sometimes maddening delays, as development teams waited for operations teams… The post Looking Past DevOps: AI, ClickOps and Platform Engineering…

Mitigating Data Breaches with AI-Driven Security Solutions

SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes, even those equipped with robust security measures. As cybercriminals become… The post Mitigating Data Breaches with AI-Driven Security Solutions appeared…

The Dual Nature of Ransomware Attacks

Financial Gain and Geopolitical Strategy Ransomware attacks have evolved from mere cybercriminal activities to sophisticated operations serving dual purposes: financial gain for attackers and advancing the geopolitical objectives of adversarial… The post The Dual Nature of Ransomware Attacks appeared first…

Artificial Intelligence in 2024

Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so far as to call it the “revolution of work.” Unfortunately,… The post Artificial Intelligence in 2024 appeared first on Cyber…

Sheltering from the Cyberattack Storm

As we move towards the summer and the promise of sunnier weather, it’s worth noting that the cybersecurity industry has seen more rain than sunshine recently. A slew of high-profile… The post Sheltering from the Cyberattack Storm appeared first on…

5 Reasons IGA Programs Fail

Identity governance and administration (IGA) is a critical part of modern business. It’s one of the single most important pieces of creating and balancing a productive and secure work environment…. The post 5 Reasons IGA Programs Fail appeared first on…

Digital Identities Have Evolved — Cyber Strategies Should Too

The scale of identity exposure has increased significantly, with over 90% of surveyed organizations reporting an identity-related breach within the last year. These attacks have long-lasting consequences – SpyCloud’s 2024 Identity Exposure Report found… The post Digital Identities Have Evolved — Cyber Strategies Should…

Stop Chasing the AI Squirrel and Patch… Just Patch

In the contemporary technological landscape, the allure of advanced artificial intelligence (AI) systems often captivates the collective imagination of the tech industry and beyond. Stories of deepfakes, such as the… The post Stop Chasing the AI Squirrel and Patch… Just…

Spotlight on DeepKeep.ai

DeepKeep, the leading provider of AI-Native Trust, Risk, and Security Management (TRiSM), empowers large corporations that rely on AI, GenAI, and LLM technologies to manage risk and protect growth. Our… The post Spotlight on DeepKeep.ai appeared first on Cyber Defense…

Security Threats Targeting Large Language Models

Evolving landscape of LLM Security The emergence of Large Language Models (LLMs) has revolutionized the capabilities of artificial intelligence, offering unprecedented potential for various applications. However, like every new technology,… The post Security Threats Targeting Large Language Models appeared first…

The Role of Human Error in Data Spillage Incidents

Unraveling Human Factors in Data Breaches Data spillage is a term used to describe the exposure of sensitive or classified information outside an organization’s designated boundary of network or safety… The post The Role of Human Error in Data Spillage…

The Morphing of Misinformation in a Super Election Year

Security a Top Concern During 2024 Election ‘Super-Cyle’ With an unprecedented ‘super-cycle’ of elections in 2024, almost half the world’s population will go to the polls before the year is… The post The Morphing of Misinformation in a Super Election…

Why the MoD Breach Calls for a Cybersecurity Overhaul

The recent cyber attack on the Ministry of Defence, which compromised the personal information of UK military personnel, serves as a stark warning for organisations across the globe and reinforces… The post Why the MoD Breach Calls for a Cybersecurity…

AI and Cybersecurity: Mitigating Risks and Safeguarding Digital Assets

Leveraging Artificial Intelligence to Enhance Cybersecurity Defenses Artificial Intelligence has become essential for safeguarding digital resources in cybersecurity. As organizations strive to defend against pragmatic threats, AI offers crucial risk… The post AI and Cybersecurity: Mitigating Risks and Safeguarding Digital…

The Scourge of Ransomware

Ransomware has become a growing threat in our new hybrid world. It encrypts a victim’s files, rendering them inaccessible, and demands a ransom payment for the decryption key. This can… The post The Scourge of Ransomware appeared first on Cyber…

Comparing MDR vs SIEM: Which Is Better for Your Business?

By Vira Shynkaruk, Cybersecurity Content Expert, UnderDefense Making the right call on cybersecurity solutions is paramount for businesses, especially now, when they are constantly under siege from cyberattacks. The critical […] The post Comparing MDR vs SIEM: Which Is Better…

Rogue Nations: An Assessment of State-Sponsored Cyberattacks.

By Jacques de la Riviere, CEO, Gatewatcher Few prefixes excite the cybersecurity market as much as ‘state-sponsored.’ The label immediately conjures images of well-equipped, highly-resourced teams targeting high-profile organisations and […] The post Rogue Nations: An Assessment of State-Sponsored Cyberattacks.…

The AI Arms Race Shaping Federal Cyber Resilience

By Gary Barlet, Federal Chief Technology Officer, Illumio At its core, the paradox of artificial intelligence (AI) in cybersecurity lies in conflicting uses. On one hand, malicious actors harness AI […] The post The AI Arms Race Shaping Federal Cyber…

A National Imperative – Cyber Resiliency

Strategies to Safeguard Critical Infrastructure Against Cyber Threats By Andrea E. Davis, Founder and President of The Resiliency Initiative I started my career in emergency management in 1999. At the […] The post A National Imperative – Cyber Resiliency appeared…

How and When to Know You Need a Fractional CISO

By Andy Hilliard, CEO of Accelerance Every business owner knows how important cyber security is. Headlines of attacks, leaks and breaches of customer data, payment information, intellectual property and more […] The post How and When to Know You Need…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top. […] The post Understanding the Dark Web: What You Need…

Navigating the Perilous Waters of Supply Chain Cybersecurity

By Kenneth Moras Introduction: In today’s interconnected business environment, reliance on innovative vendors and open source solutions is inevitable. However, these supply chains also stand on the frontline in the […] The post Navigating the Perilous Waters of Supply Chain…

Emerging Technology Review and Needs

By Milica D. Djekic The progress distribution is a slow and time-consuming process that normally might take decades and sometimes centuries in order to deliver a betterment for many to […] The post Emerging Technology Review and Needs appeared first…

Spotlight on Scribe Security

By Dan K. Anderson vCISO and On-Call Roving Reporter, Cyber Defense Magazine In my travels and works one of the most difficult challenges for Security is achieving good relations and […] The post Spotlight on Scribe Security appeared first on…

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally […] The post Combating Cyber-attacks with Threat-Intelligence appeared first on…

The TikTok Ban Spells Trouble for Chinese IoT

What businesses should do today to prepare for likely bans across Chinese tech tomorrow By Carsten Rhod Gregersen, Founder and CEO of Nabto It’s happening. Following years of rumors, The […] The post The TikTok Ban Spells Trouble for Chinese…

AI Can Bridge the Gap of Ineffective MDR Tools

By Orion Cassetto, Head of Marketing, Radiant Security Last year, nearly one-third of organizations suffered breaches, prompting security professionals to reevaluate the performance of their existing managed detection and response […] The post AI Can Bridge the Gap of Ineffective…