The Federal OT footprint – from military base operations to their public utilities, from postal operations to NASA missions – is immense, which means the potential cyber attack surface is… The post Who’s Minding the Store? Why Operational Technology Security…
Category: Cyber Defense Magazine
The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth
Data security and consumer trust go hand-in-hand in our evolving digital world There’s no doubt that data is a catalyst of growth, forcing companies to increasingly rely on it to… The post The Value of Trust: How Companies Can Harness…
It Is Time for Smart Cyber Requirements for the Water Sector
Since 2021, the Biden Administration has been consistently talking about the limitations of a purely voluntary approach to cybersecurity for critical infrastructure, and the need for a strategic shift. Among… The post It Is Time for Smart Cyber Requirements for…
Looking Past DevOps: AI, ClickOps and Platform Engineering
About fifteen years ago, DevOps radically overhauled the world of software engineering. Previously, the development process had been defined by sometimes maddening delays, as development teams waited for operations teams… The post Looking Past DevOps: AI, ClickOps and Platform Engineering…
The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare
In an alarming revelation, Kaiser Foundation Health Plan reported a data breach impacting over 13 million individuals. For years, there has been an unspoken but critical vulnerability in the healthcare… The post The Kaiser Data Breach Should Be a Wake-Up…
How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert
It doesn’t take much to guess why cybercriminals increasingly target banking applications including emerging fintech and trading as their prime targets – cybercriminals have and continue to be largely financially-motivated…. The post How to Best Secure Banking Applications – Top…
Mitigating Data Breaches with AI-Driven Security Solutions
SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes, even those equipped with robust security measures. As cybercriminals become… The post Mitigating Data Breaches with AI-Driven Security Solutions appeared…
The Dual Nature of Ransomware Attacks
Financial Gain and Geopolitical Strategy Ransomware attacks have evolved from mere cybercriminal activities to sophisticated operations serving dual purposes: financial gain for attackers and advancing the geopolitical objectives of adversarial… The post The Dual Nature of Ransomware Attacks appeared first…
The Other Lesson from the XZ Utils Supply-Chain Attack
“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in the case of the recent XZ Utils case, it was… The post The Other Lesson from the XZ Utils Supply-Chain…
Eliminating the Last Mile Between Security Data and Decision Making
Once upon a time, when we used to have to go to physical stores to get the products we needed, there was no such thing as the retail “last mile”… The post Eliminating the Last Mile Between Security Data and…
Artificial Intelligence in 2024
Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so far as to call it the “revolution of work.” Unfortunately,… The post Artificial Intelligence in 2024 appeared first on Cyber…
Unlocking the Power of Behavioral Cloud Native Threat Detection and Response
Behavioral detection and response is not a new concept, and the top three detection and response players command a combined market capitalization of $100 billion. But the rise of cloud… The post Unlocking the Power of Behavioral Cloud Native Threat…
Sheltering from the Cyberattack Storm
As we move towards the summer and the promise of sunnier weather, it’s worth noting that the cybersecurity industry has seen more rain than sunshine recently. A slew of high-profile… The post Sheltering from the Cyberattack Storm appeared first on…
Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management
The massive Snowflake breach disclosed recently, involving hundreds of millions of stolen customer records, is a stark wake-up call for organizations to proactively manage their SaaS security. No doubt the… The post Changing the Passive to Active: Updating SaaS Cybersecurity…
Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management
Single Sign-On (SSO) serves as the linchpin connecting corporate networks, facilitating seamless access to various web applications without the need for repeated login credentials. However, there are several untold challenges… The post Deep Dive: Unveiling the Untold Challenges of Single…
How the Newest Tech Changes Cybersecurity Needs in the Legal Industry
Responsibly Adopting Technology to Improve Law Firm Productivity Lawyers face incredible pressure in their jobs to perform accurately and quickly. Thankfully, technology has been introduced that now allows legal professionals… The post How the Newest Tech Changes Cybersecurity Needs in…
5 Reasons IGA Programs Fail
Identity governance and administration (IGA) is a critical part of modern business. It’s one of the single most important pieces of creating and balancing a productive and secure work environment…. The post 5 Reasons IGA Programs Fail appeared first on…
The First 10 Days of a vCISOs Journey with a New Client
“In a quaint village nestled between rolling hills and dense forests, a young apprentice named Eli was learning to throw pottery from a master potter. On the first day by… The post The First 10 Days of a vCISOs Journey…
Pioneering the New Frontier in AI Consumer Protection and Cyber Defense
In a groundbreaking move, the first state in the U.S. has passed comprehensive legislation aimed at protecting consumers from the potential risks associated with AI. The new Utah Artificial Intelligence… The post Pioneering the New Frontier in AI Consumer Protection…
Digital Identities Have Evolved — Cyber Strategies Should Too
The scale of identity exposure has increased significantly, with over 90% of surveyed organizations reporting an identity-related breach within the last year. These attacks have long-lasting consequences – SpyCloud’s 2024 Identity Exposure Report found… The post Digital Identities Have Evolved — Cyber Strategies Should…
Stop Chasing the AI Squirrel and Patch… Just Patch
In the contemporary technological landscape, the allure of advanced artificial intelligence (AI) systems often captivates the collective imagination of the tech industry and beyond. Stories of deepfakes, such as the… The post Stop Chasing the AI Squirrel and Patch… Just…
Guardians of the Grid: Cyber-Secure Microgrids and the Future of Energy Resilience
The Crucial Role of Cyber-Resilient Microgrids The vulnerability of major metropolitan power grids to natural disasters has become a pressing concern, but mother nature isn’t the only thing threatening our… The post Guardians of the Grid: Cyber-Secure Microgrids and the…
Spotlight on DeepKeep.ai
DeepKeep, the leading provider of AI-Native Trust, Risk, and Security Management (TRiSM), empowers large corporations that rely on AI, GenAI, and LLM technologies to manage risk and protect growth. Our… The post Spotlight on DeepKeep.ai appeared first on Cyber Defense…
Latest WatchGuard Report Reveals Rise in Threat Actors Exploiting Remote Access
Cybersecurity threats continue to grow, with the threat landscape constantly evolving and hackers employing increasingly sophisticated and unpredictable methods. With an ongoing cybersecurity skills shortage, the need for Managed Service… The post Latest WatchGuard Report Reveals Rise in Threat Actors…
The Pitfalls (and How to Avoid Them) for Cybersecurity Startup Founders
The cybersecurity landscape is a battlefield, but the biggest threats don’t always come from external hackers. As a seasoned warrior in this space, I’ve seen countless founders, brimming with passion… The post The Pitfalls (and How to Avoid Them) for…
Security Threats Targeting Large Language Models
Evolving landscape of LLM Security The emergence of Large Language Models (LLMs) has revolutionized the capabilities of artificial intelligence, offering unprecedented potential for various applications. However, like every new technology,… The post Security Threats Targeting Large Language Models appeared first…
Healthcare Industry Under Siege: Latest String of Ransomware Attacks Renews Emphasis on Cybersecurity Defenses
As the ransomware threat landscape continues to wreak havoc on industries across the nation, healthcare providers all over the country are having difficulties receiving payment due to an attack that… The post Healthcare Industry Under Siege: Latest String of Ransomware…
The Role of Human Error in Data Spillage Incidents
Unraveling Human Factors in Data Breaches Data spillage is a term used to describe the exposure of sensitive or classified information outside an organization’s designated boundary of network or safety… The post The Role of Human Error in Data Spillage…
The Morphing of Misinformation in a Super Election Year
Security a Top Concern During 2024 Election ‘Super-Cyle’ With an unprecedented ‘super-cycle’ of elections in 2024, almost half the world’s population will go to the polls before the year is… The post The Morphing of Misinformation in a Super Election…
Overcome AI-Oriented Phishing Attacks with These Sure-Fire Strategies
Artificial intelligence is an ever-evolving subject; year by year, its landscape is expanding to different industries, and the outcome of its optimization is noteworthy. One of the prominent tech giants,… The post Overcome AI-Oriented Phishing Attacks with These Sure-Fire Strategies…
New Phishing Campaign Using AI generated Emails, Human Live Chat to Target Social Media Business Accounts
Fraudsters leverage complex phishing scams in attempt to gain control over organizations’ Meta accounts A sophisticated phishing campaign is targeting businesses of every size in an attempt to compromise Facebook… The post New Phishing Campaign Using AI generated Emails, Human…
Why the MoD Breach Calls for a Cybersecurity Overhaul
The recent cyber attack on the Ministry of Defence, which compromised the personal information of UK military personnel, serves as a stark warning for organisations across the globe and reinforces… The post Why the MoD Breach Calls for a Cybersecurity…
How to Prepare for ISO 27001:2022’s Threat Intelligence Requirements
Countdown to October 2025 As the cybersecurity landscape continues to evolve and become more complex, international regulations are similarly following suit to keep pace and set a benchmark to mitigate… The post How to Prepare for ISO 27001:2022’s Threat Intelligence…
Optimizing IT Team Collaboration – An Innovative Approach to Enhancing Productivity
Optimizing IT team collaboration hinges on recognizing their unique team challenges, such as siloed knowledge and communication barriers, as well as the different working styles of product managers, software engineers,… The post Optimizing IT Team Collaboration – An Innovative Approach…
AI and Cybersecurity: Mitigating Risks and Safeguarding Digital Assets
Leveraging Artificial Intelligence to Enhance Cybersecurity Defenses Artificial Intelligence has become essential for safeguarding digital resources in cybersecurity. As organizations strive to defend against pragmatic threats, AI offers crucial risk… The post AI and Cybersecurity: Mitigating Risks and Safeguarding Digital…
RSA Conference 2024: Exploring our Current Cybersecurity Realities Amidst AI Myths
AI. Artificial Intelligence. One acronym, two words that seem to have reshaped the landscape of cybersecurity. At the 2024 RSA Conference, it was ubiquitous: stamped on almost every booth’s showcase,… The post RSA Conference 2024: Exploring our Current Cybersecurity Realities…
RSA Conference 2024 Highlights: Cutting-Edge Cybersecurity Innovations
AI in Action: Real-World Breakthroughs and Innovations Attending the RSA Conference for the first time was an incredible experience! Ever since I began my journey in cybersecurity, attending the RSA… The post RSA Conference 2024 Highlights: Cutting-Edge Cybersecurity Innovations appeared…
The Scourge of Ransomware
Ransomware has become a growing threat in our new hybrid world. It encrypts a victim’s files, rendering them inaccessible, and demands a ransom payment for the decryption key. This can… The post The Scourge of Ransomware appeared first on Cyber…
Strengthening Cybersecurity – Transforming in the Age of Healthcare Digitalization
Healthcare and technology increasingly intersect in today’s world, and cybersecurity has become a primary concern for many companies. However, the recent attack on Change Healthcare serves as a harsh reminder… The post Strengthening Cybersecurity – Transforming in the Age of…
Is Your Organization a Laggard or a Leader in Digital Trust?
By Mike Fleck, Head of Product Marketing at DigiCert Digital trust is at the core of what makes internet connected experiences valuable. Whether we’re making an e-commerce purchase, signing a […] The post Is Your Organization a Laggard or a…
Comparing MDR vs SIEM: Which Is Better for Your Business?
By Vira Shynkaruk, Cybersecurity Content Expert, UnderDefense Making the right call on cybersecurity solutions is paramount for businesses, especially now, when they are constantly under siege from cyberattacks. The critical […] The post Comparing MDR vs SIEM: Which Is Better…
Rogue Nations: An Assessment of State-Sponsored Cyberattacks.
By Jacques de la Riviere, CEO, Gatewatcher Few prefixes excite the cybersecurity market as much as ‘state-sponsored.’ The label immediately conjures images of well-equipped, highly-resourced teams targeting high-profile organisations and […] The post Rogue Nations: An Assessment of State-Sponsored Cyberattacks.…
The AI Arms Race Shaping Federal Cyber Resilience
By Gary Barlet, Federal Chief Technology Officer, Illumio At its core, the paradox of artificial intelligence (AI) in cybersecurity lies in conflicting uses. On one hand, malicious actors harness AI […] The post The AI Arms Race Shaping Federal Cyber…
Get 10x more Visibility across APTs with Red Piranha’s SOC-as-a-Service and Crystal Eye
By Adam Bennett, CEO, Red Piranha Cyberattacks are on the rise and it’s crucial for organizations to have a reliable security system that can detect and respond to threats in […] The post Get 10x more Visibility across APTs with…
A National Imperative – Cyber Resiliency
Strategies to Safeguard Critical Infrastructure Against Cyber Threats By Andrea E. Davis, Founder and President of The Resiliency Initiative I started my career in emergency management in 1999. At the […] The post A National Imperative – Cyber Resiliency appeared…
How and When to Know You Need a Fractional CISO
By Andy Hilliard, CEO of Accelerance Every business owner knows how important cyber security is. Headlines of attacks, leaks and breaches of customer data, payment information, intellectual property and more […] The post How and When to Know You Need…
Understanding the Dark Web: What You Need to Know
Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top. […] The post Understanding the Dark Web: What You Need…
Special Cybersecurity Considerations for Medical and Legal Practices
“Protect The Most Vulnerable at Their Most Vulnerable Times” By Jim Ford, Founder and CEO, PatientLock® and JurisLock™ In the spring of 2018, my (then) pregnant wife and I went […] The post Special Cybersecurity Considerations for Medical and Legal…
How to Hunt for Volt Typhoon Malware in Critical Infrastructure
🚨🔍 Don’t miss out on the Hunt for Volt Typhoon event! 🌐💻 Join us to explore cutting-edge cyber tactics, innovative defense strategies, and the latest in threat detection. Perfect for […] The post How to Hunt for Volt Typhoon Malware…
Cybersecurity as a Service Market: A Domain of Innumerable Opportunities
Cybersecurity as a Service Market By Aashi Mishra, Content Writer, Research Nester The increased internet usage, all across the globe, is giving rise to cybercrime cases. Cybercrime is any unlawful […] The post Cybersecurity as a Service Market: A Domain…
How Improving EV Charging Infrastructure Can Bolster US Cybersecurity Measures
By Elaina Farnsworth, Co-founder & CEO — SkillFusion The surging popularity of electric vehicles (EVs) is marking a strong push toward overall sustainability for the United States. However, as EV […] The post How Improving EV Charging Infrastructure Can Bolster…
Navigating the Perilous Waters of Supply Chain Cybersecurity
By Kenneth Moras Introduction: In today’s interconnected business environment, reliance on innovative vendors and open source solutions is inevitable. However, these supply chains also stand on the frontline in the […] The post Navigating the Perilous Waters of Supply Chain…
The Challenge of Combatting Threats Against Autonomous Vehicles
By Joseph Hladik, Cyber Group Lead, Neya Systems From perception and sensing to mapping and localization, both off-road and on-road autonomous vehicles rely heavily on software and connectivity to operate […] The post The Challenge of Combatting Threats Against Autonomous…
Emerging Technology Review and Needs
By Milica D. Djekic The progress distribution is a slow and time-consuming process that normally might take decades and sometimes centuries in order to deliver a betterment for many to […] The post Emerging Technology Review and Needs appeared first…
Spotlight on Scribe Security
By Dan K. Anderson vCISO and On-Call Roving Reporter, Cyber Defense Magazine In my travels and works one of the most difficult challenges for Security is achieving good relations and […] The post Spotlight on Scribe Security appeared first on…
Combating Cyber-attacks with Threat-Intelligence
Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally […] The post Combating Cyber-attacks with Threat-Intelligence appeared first on…
Mastering the Art of Digital Management: Potential Risks and Business Best Practices
By Allison Raley, Partner, Arnall Golden Gregory Cryptocurrency has opened unprecedented opportunities for businesses to streamline transactions across global markets, revolutionizing the traditional financial landscape. By leveraging blockchain technology, businesses […] The post Mastering the Art of Digital Management: Potential…
How to Design a Zero Trust Strategy for Remote Workers
By Federico Charosky, Founder and CEO, Quorum Cyber The modern workforce expects to work anywhere from any device. To support this approach investment is needed in a broader security program […] The post How to Design a Zero Trust Strategy…
The TikTok Ban Spells Trouble for Chinese IoT
What businesses should do today to prepare for likely bans across Chinese tech tomorrow By Carsten Rhod Gregersen, Founder and CEO of Nabto It’s happening. Following years of rumors, The […] The post The TikTok Ban Spells Trouble for Chinese…
AI Can Bridge the Gap of Ineffective MDR Tools
By Orion Cassetto, Head of Marketing, Radiant Security Last year, nearly one-third of organizations suffered breaches, prompting security professionals to reevaluate the performance of their existing managed detection and response […] The post AI Can Bridge the Gap of Ineffective…
The “Non-Trend” of “Full Automation” Workflows in Cybersecurity: A Reality Check
By Oren Koren, CPO & Co-Founder of VERITI It’s no surprise that there’s been a shift to automated workflows in the past decade. Initially, automation seemed straightforward: detect malicious activity, […] The post The “Non-Trend” of “Full Automation” Workflows in…
Spotlight on Riskassure
Riskaware by Riskassure Solves a Unique Problem By Dan K. Anderson vCISO and On-Call Roving Reporter, CyberDefense Magazine In preparing for this article, I met with Larry Faragalli, Keith Huckaby, […] The post Spotlight on Riskassure appeared first on Cyber…
A Closer Look at Recent Changes to New York State Department of Financial Services (NYSDFS) Cybersecurity Regulation
By Christopher Salone, Consulting Manager at FoxPointe Solutions Most changes to The New York State Department of Financial Services (NYSDFS) Cybersecurity Regulation, 23 NYCRR Part 500, introduced November 2023, have […] The post A Closer Look at Recent Changes to…
Applied Human Threat Management in Cyber Industry
By Milica D. Djekic The high-tech industry is an extremely emerging environment dealing with the sophisticated and skilled workforce that is recruited to develop an ultimate cutting-edge technology, so far. […] The post Applied Human Threat Management in Cyber Industry…
Cloud Control: Strategic Insights for Securing Your Digital Infrastructure
By Joe Guerra, M.Ed, CASP+, Professor of Cybersecurity, Hallmark University When we talk about the cloud, it’s not just a buzzword; it’s a revolutionary model that has transformed how organizations, […] The post Cloud Control: Strategic Insights for Securing Your…
Cybersecurity 101: Understanding the Basics of Online Protection
By Prem Khatri, Vice President of Operations for Chetu, Inc. In our more and more interconnected world, cybersecurity has turn out to be a paramount challenge for individuals, groups, and […] The post Cybersecurity 101: Understanding the Basics of Online…
Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter
In the fast-moving age of artificial intelligence (AI), cybersecurity is more important than ever before. By Tyler Derr, Chief Technology Officer (CTO), Broadridge In the fast-moving age of artificial intelligence […] The post Cyber Resiliency in The Age Of AI:…
Limits of Automation
How Interactive Sandboxing Can Benefit Your Organization By Vlad Ananin, Technical Writer at Any.Run The current rate and complexity of cyber attacks are making it harder than ever for companies […] The post Limits of Automation appeared first on Cyber…
Why Do Hackers Love Cryptocurrency?
Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to […] The post Why Do Hackers Love Cryptocurrency? appeared first…
Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity
Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has […] The post Insights from RSA Conference 2024: Transformative Innovations…
Cryptographic Protocol Challenges
By Milica D. Djekic The communication protocol is an information exchange method where data are transferred only if two or more networking devices deal with a set of the rules […] The post Cryptographic Protocol Challenges appeared first on Cyber…
Cybersecurity Concerns Facing the 2024 U.S. Elections
By Zac Amos, Features Editor, ReHack Cybersecurity oversights are making infrastructure in the U.S. the most fragile it has been in history. Hackers are constantly developing new strategies to topple […] The post Cybersecurity Concerns Facing the 2024 U.S. Elections…
Crypto Kaleidoscope: Investing in Colorful Coins, Living a Vibrant Life
By Thea Payne In the ever-evolving landscape of cryptocurrency, investors are constantly on the lookout for the next big thing. While Bitcoin and Ethereum dominate the headlines, a new trend […] The post Crypto Kaleidoscope: Investing in Colorful Coins, Living…
CES: AI at the Forefront of Cybersecurity’s Future
Examining the Increased Use of Artificial Intelligence in Cybersecurity By Matthew Taylor, Vice President of Projects and Engineering, MxD The annual Consumer Electronics Show (CES) is the world’s largest consumer […] The post CES: AI at the Forefront of Cybersecurity’s…
Why Millions of Pcs Aren’t Ready for Evolving Cyber Threats
By Achi Lewis, Area VP EMEA for Absolute Security Ongoing global security threats, underpinned by continuous fears by the White House and NCSC, require an urgent call to bolster security defenses […] The post Why Millions of Pcs Aren’t Ready for…
What Individuals Get Wrong About Business Email Compromise
Businesses tend to obsess over business email compromise. This obsession is misguided. Observations from the front lines of combating business email compromise at the SMB scale and what we should […] The post What Individuals Get Wrong About Business Email…
The Cybersecurity Conundrum: Navigating the Challenges with Fewer Resources and Rising Threats
By David Lee, Chief Evangelist and Visionary for Tech Diversity The cybersecurity world is no stranger to adversity, but 2023 presented a unique set of challenges with industry veterans and […] The post The Cybersecurity Conundrum: Navigating the Challenges with…
Tightening Water Cybersecurity is Now Imperative as Biden Administration Issues Urgent Warning to State Leaders
By Robin Berthier, Co-Founder & CEO, Network Perception As the world grapples with escalating cyber threats, the Biden administration has sounded a clarion call to state leaders: bolstering water cybersecurity […] The post Tightening Water Cybersecurity is Now Imperative as…
Relying on the Unreliable
The Hidden Costs of Facial Recognition Technology By Tinglong Dai Bernard T. Ferrari Professor of Business The Carey Business School at Johns Hopkins University With generative AI dominating the tech […] The post Relying on the Unreliable appeared first on…
Keeping Pace with an Evolving Security and Trust Landscape
By Dean Coclin, Senior Director, Digital Trust Specialist, DigiCert It’s clear that 2023 will be remembered as the point that artificial intelligence (AI) stepped out of the shadows and took […] The post Keeping Pace with an Evolving Security and…
How Main Street Businesses Can Up Their Cybersecurity Game
By Mike Caralis, Vice President, Business Markets at Verizon Small businesses are not only essential in keeping Main Street thriving and bustling (I love my local sushi place), but they […] The post How Main Street Businesses Can Up Their…
CTI for M&A
Active dark web Intelligence to aid M&A By Shawn Loveland, COO, Resecurity Every industry-leading company has gone through mergers and acquisitions (M&A) at some point to acquire a competitor, expand […] The post CTI for M&A appeared first on Cyber…
Is Zero Trust Enough?
Why Zero Access Is a Better Way To Protect Your Backup Infrastructure By Greg Tevis, Vice President of Strategy, Cobalt Iron Backup has always been seen as the last line […] The post Is Zero Trust Enough? appeared first on…
Cross-Team Collaboration is Vital for Organizations in Today’s Digital Landscape
By Tony King, SVP International at NETSCOUT In today’s world, where the digital landscape is rapidly evolving, the cyber threat level is continuing to grow. Cybercriminals are constantly refining their […] The post Cross-Team Collaboration is Vital for Organizations in…
Full Drive Encryption Only a Half-Measure for Data Security
Pre-Boot Authentication Is the Missing Half By John Benkert, Cigent CEO and Co-founder In an era where data security breaches are not just incidents but an event that can topple […] The post Full Drive Encryption Only a Half-Measure for…
AI, Deepfakes and Digital ID: The New Frontier of Corporate Cybersecurity
By Michael Marcotte, Founder & CEO of artius.iD The emergence of deepfakes fired the starting pistol in a cybersecurity arms race. Paranoia about their impact has rippled out into a […] The post AI, Deepfakes and Digital ID: The New…
How Empathetic Leadership Can Shape the Future of Inclusion in Cybersecurity
By Lauren Neal, Founder and Chief Programme Creator, Valued at Work In the fast-paced world of technology, the importance of inclusion cannot be overstated. The cybersecurity industry is a powerhouse […] The post How Empathetic Leadership Can Shape the Future…
Building AI on a Foundation of Open Source Requires a Fundamentally New Approach to Application Security
By Nadav Czerninski, Co-founder and CEO, Oligo Security AI has sprung from the pages of science fiction into our daily lives. The AI revolution is now accelerating, enabled by open-source […] The post Building AI on a Foundation of Open…
Bridging The Gap: Diversity Cyber Council and The Emergence of Tech as The New Opportunity Frontier
Diversity Cyber Council Initiative By Donna Segura, Publicist: OleanderPR In a world where technology is rapidly redefining every aspect of our lives, there’s a burgeoning recognition of the need for […] The post Bridging The Gap: Diversity Cyber Council and…
Beyond Code: Harnessing AI for Advanced Cybersecurity Solutions
By Angel Vossough, Co-Founder & CEO of BetterAI.io Cybersecurity defenses are shifting, aiming to predict and block cyber threats in advance, acting as digital guardians attempting to stay one step […] The post Beyond Code: Harnessing AI for Advanced Cybersecurity…
Best Password Generators of 2024 to Secure Your Accounts
Overview of best password generators to secure online accounts By Mia Naumoska, CMO at Internxt Despite the current advances in technology, one thing that has stood the test of time […] The post Best Password Generators of 2024 to Secure…
Becoming Resilient to The Cyber Incidents of Today And Tomorrow
By Theresa Le, Chief Claims Officer, Cowbell As cyber threats escalate and evolve worldwide, businesses must ensure their foundations are solid to withstand potential cyber incidents. Developing organizational resilience involves […] The post Becoming Resilient to The Cyber Incidents of…
Anatomy Of an Endpoint Attack: How A Cyberattack Can Compromise an Enterprise Network
By Guillermo Gomez, Vice President of Endpoint Product, WatchGuard Technologies For truly effective network security posture, it’s crucial to protect all of your company’s devices as cyber adversaries can turn […] The post Anatomy Of an Endpoint Attack: How A…
The Critical Role of Training and Phishing Testing in Safeguarding Financial Data
Empowering the Human Firewall: The Bedrock of Cyber Defense By Michael Cocanower, CEO, AdviserCyber The Evolving Cybersecurity Landscape for RIAs and Professionals For Registered Investment Advisers (RIAs) and cybersecurity professionals […] The post The Critical Role of Training and Phishing…
A Transformative Landscape in Legal Technology: From the Past to AI-Powered Future
By Rob Scott, Chief Innovator – Monjur The modern digital era, ripe with unparalleled technological evolutions, is remolding our perceptions and expectations at a pace once thought inconceivable. Among all […] The post A Transformative Landscape in Legal Technology: From…
6 Factors to Consider When Choosing a SIEM Solution
Don’t Settle for Less | Make an Informed Decision By Krunal Mendapara, Chief Technology Officer, Sattrix Group In today’s world, cyber threats are more rampant than ever before. It’s no […] The post 6 Factors to Consider When Choosing a…
2024: The Year of Secure Design
By Stephen de Vries, CEO, IriusRisk In 2023, we saw governments and global cybersecurity agencies begin to put the building blocks in place for secure design and take cyber defense […] The post 2024: The Year of Secure Design appeared…
Fortifying Digital Health Against Cyber Attacks
By Nissim Ben-Saadon, Director of Innovation, CYREBRO In today’s digital era, the healthcare industry stands at the forefront of technological adoption, heavily relying on digital systems such as Electronic Health […] The post Fortifying Digital Health Against Cyber Attacks appeared…
Strengthening Cyber Defense with Threat Intelligence Operations
By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to […] The post Strengthening Cyber Defense with Threat Intelligence Operations…
A Consolidated Approach to Fraud: Bringing Together Risk Insights, Organizations and Technology
By Kimberly Sutherland, vice president, fraud and identity strategy, LexisNexis® Risk Solutions Digital fraud has seen a substantial increase in recent years, mainly due to the sharp rise in digital […] The post A Consolidated Approach to Fraud: Bringing Together…