By Federico Charosky, Founder and CEO, Quorum Cyber The modern workforce expects to work anywhere from any device. To support this approach investment is needed in a broader security program […] The post How to Design a Zero Trust Strategy…
Category: Cyber Defense Magazine
The TikTok Ban Spells Trouble for Chinese IoT
What businesses should do today to prepare for likely bans across Chinese tech tomorrow By Carsten Rhod Gregersen, Founder and CEO of Nabto It’s happening. Following years of rumors, The […] The post The TikTok Ban Spells Trouble for Chinese…
AI Can Bridge the Gap of Ineffective MDR Tools
By Orion Cassetto, Head of Marketing, Radiant Security Last year, nearly one-third of organizations suffered breaches, prompting security professionals to reevaluate the performance of their existing managed detection and response […] The post AI Can Bridge the Gap of Ineffective…
The “Non-Trend” of “Full Automation” Workflows in Cybersecurity: A Reality Check
By Oren Koren, CPO & Co-Founder of VERITI It’s no surprise that there’s been a shift to automated workflows in the past decade. Initially, automation seemed straightforward: detect malicious activity, […] The post The “Non-Trend” of “Full Automation” Workflows in…
Spotlight on Riskassure
Riskaware by Riskassure Solves a Unique Problem By Dan K. Anderson vCISO and On-Call Roving Reporter, CyberDefense Magazine In preparing for this article, I met with Larry Faragalli, Keith Huckaby, […] The post Spotlight on Riskassure appeared first on Cyber…
A Closer Look at Recent Changes to New York State Department of Financial Services (NYSDFS) Cybersecurity Regulation
By Christopher Salone, Consulting Manager at FoxPointe Solutions Most changes to The New York State Department of Financial Services (NYSDFS) Cybersecurity Regulation, 23 NYCRR Part 500, introduced November 2023, have […] The post A Closer Look at Recent Changes to…
Applied Human Threat Management in Cyber Industry
By Milica D. Djekic The high-tech industry is an extremely emerging environment dealing with the sophisticated and skilled workforce that is recruited to develop an ultimate cutting-edge technology, so far. […] The post Applied Human Threat Management in Cyber Industry…
Cloud Control: Strategic Insights for Securing Your Digital Infrastructure
By Joe Guerra, M.Ed, CASP+, Professor of Cybersecurity, Hallmark University When we talk about the cloud, it’s not just a buzzword; it’s a revolutionary model that has transformed how organizations, […] The post Cloud Control: Strategic Insights for Securing Your…
Cybersecurity 101: Understanding the Basics of Online Protection
By Prem Khatri, Vice President of Operations for Chetu, Inc. In our more and more interconnected world, cybersecurity has turn out to be a paramount challenge for individuals, groups, and […] The post Cybersecurity 101: Understanding the Basics of Online…
Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter
In the fast-moving age of artificial intelligence (AI), cybersecurity is more important than ever before. By Tyler Derr, Chief Technology Officer (CTO), Broadridge In the fast-moving age of artificial intelligence […] The post Cyber Resiliency in The Age Of AI:…
Limits of Automation
How Interactive Sandboxing Can Benefit Your Organization By Vlad Ananin, Technical Writer at Any.Run The current rate and complexity of cyber attacks are making it harder than ever for companies […] The post Limits of Automation appeared first on Cyber…
Why Do Hackers Love Cryptocurrency?
Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to […] The post Why Do Hackers Love Cryptocurrency? appeared first…
Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity
Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has […] The post Insights from RSA Conference 2024: Transformative Innovations…
Cryptographic Protocol Challenges
By Milica D. Djekic The communication protocol is an information exchange method where data are transferred only if two or more networking devices deal with a set of the rules […] The post Cryptographic Protocol Challenges appeared first on Cyber…
Cybersecurity Concerns Facing the 2024 U.S. Elections
By Zac Amos, Features Editor, ReHack Cybersecurity oversights are making infrastructure in the U.S. the most fragile it has been in history. Hackers are constantly developing new strategies to topple […] The post Cybersecurity Concerns Facing the 2024 U.S. Elections…
Crypto Kaleidoscope: Investing in Colorful Coins, Living a Vibrant Life
By Thea Payne In the ever-evolving landscape of cryptocurrency, investors are constantly on the lookout for the next big thing. While Bitcoin and Ethereum dominate the headlines, a new trend […] The post Crypto Kaleidoscope: Investing in Colorful Coins, Living…
CES: AI at the Forefront of Cybersecurity’s Future
Examining the Increased Use of Artificial Intelligence in Cybersecurity By Matthew Taylor, Vice President of Projects and Engineering, MxD The annual Consumer Electronics Show (CES) is the world’s largest consumer […] The post CES: AI at the Forefront of Cybersecurity’s…
Why Millions of Pcs Aren’t Ready for Evolving Cyber Threats
By Achi Lewis, Area VP EMEA for Absolute Security Ongoing global security threats, underpinned by continuous fears by the White House and NCSC, require an urgent call to bolster security defenses […] The post Why Millions of Pcs Aren’t Ready for…
What Individuals Get Wrong About Business Email Compromise
Businesses tend to obsess over business email compromise. This obsession is misguided. Observations from the front lines of combating business email compromise at the SMB scale and what we should […] The post What Individuals Get Wrong About Business Email…
The Cybersecurity Conundrum: Navigating the Challenges with Fewer Resources and Rising Threats
By David Lee, Chief Evangelist and Visionary for Tech Diversity The cybersecurity world is no stranger to adversity, but 2023 presented a unique set of challenges with industry veterans and […] The post The Cybersecurity Conundrum: Navigating the Challenges with…
Tightening Water Cybersecurity is Now Imperative as Biden Administration Issues Urgent Warning to State Leaders
By Robin Berthier, Co-Founder & CEO, Network Perception As the world grapples with escalating cyber threats, the Biden administration has sounded a clarion call to state leaders: bolstering water cybersecurity […] The post Tightening Water Cybersecurity is Now Imperative as…
Relying on the Unreliable
The Hidden Costs of Facial Recognition Technology By Tinglong Dai Bernard T. Ferrari Professor of Business The Carey Business School at Johns Hopkins University With generative AI dominating the tech […] The post Relying on the Unreliable appeared first on…
Keeping Pace with an Evolving Security and Trust Landscape
By Dean Coclin, Senior Director, Digital Trust Specialist, DigiCert It’s clear that 2023 will be remembered as the point that artificial intelligence (AI) stepped out of the shadows and took […] The post Keeping Pace with an Evolving Security and…
How Main Street Businesses Can Up Their Cybersecurity Game
By Mike Caralis, Vice President, Business Markets at Verizon Small businesses are not only essential in keeping Main Street thriving and bustling (I love my local sushi place), but they […] The post How Main Street Businesses Can Up Their…
CTI for M&A
Active dark web Intelligence to aid M&A By Shawn Loveland, COO, Resecurity Every industry-leading company has gone through mergers and acquisitions (M&A) at some point to acquire a competitor, expand […] The post CTI for M&A appeared first on Cyber…
Is Zero Trust Enough?
Why Zero Access Is a Better Way To Protect Your Backup Infrastructure By Greg Tevis, Vice President of Strategy, Cobalt Iron Backup has always been seen as the last line […] The post Is Zero Trust Enough? appeared first on…
Cross-Team Collaboration is Vital for Organizations in Today’s Digital Landscape
By Tony King, SVP International at NETSCOUT In today’s world, where the digital landscape is rapidly evolving, the cyber threat level is continuing to grow. Cybercriminals are constantly refining their […] The post Cross-Team Collaboration is Vital for Organizations in…
Full Drive Encryption Only a Half-Measure for Data Security
Pre-Boot Authentication Is the Missing Half By John Benkert, Cigent CEO and Co-founder In an era where data security breaches are not just incidents but an event that can topple […] The post Full Drive Encryption Only a Half-Measure for…
AI, Deepfakes and Digital ID: The New Frontier of Corporate Cybersecurity
By Michael Marcotte, Founder & CEO of artius.iD The emergence of deepfakes fired the starting pistol in a cybersecurity arms race. Paranoia about their impact has rippled out into a […] The post AI, Deepfakes and Digital ID: The New…
How Empathetic Leadership Can Shape the Future of Inclusion in Cybersecurity
By Lauren Neal, Founder and Chief Programme Creator, Valued at Work In the fast-paced world of technology, the importance of inclusion cannot be overstated. The cybersecurity industry is a powerhouse […] The post How Empathetic Leadership Can Shape the Future…
Building AI on a Foundation of Open Source Requires a Fundamentally New Approach to Application Security
By Nadav Czerninski, Co-founder and CEO, Oligo Security AI has sprung from the pages of science fiction into our daily lives. The AI revolution is now accelerating, enabled by open-source […] The post Building AI on a Foundation of Open…
Bridging The Gap: Diversity Cyber Council and The Emergence of Tech as The New Opportunity Frontier
Diversity Cyber Council Initiative By Donna Segura, Publicist: OleanderPR In a world where technology is rapidly redefining every aspect of our lives, there’s a burgeoning recognition of the need for […] The post Bridging The Gap: Diversity Cyber Council and…
Beyond Code: Harnessing AI for Advanced Cybersecurity Solutions
By Angel Vossough, Co-Founder & CEO of BetterAI.io Cybersecurity defenses are shifting, aiming to predict and block cyber threats in advance, acting as digital guardians attempting to stay one step […] The post Beyond Code: Harnessing AI for Advanced Cybersecurity…
Best Password Generators of 2024 to Secure Your Accounts
Overview of best password generators to secure online accounts By Mia Naumoska, CMO at Internxt Despite the current advances in technology, one thing that has stood the test of time […] The post Best Password Generators of 2024 to Secure…
Becoming Resilient to The Cyber Incidents of Today And Tomorrow
By Theresa Le, Chief Claims Officer, Cowbell As cyber threats escalate and evolve worldwide, businesses must ensure their foundations are solid to withstand potential cyber incidents. Developing organizational resilience involves […] The post Becoming Resilient to The Cyber Incidents of…
Anatomy Of an Endpoint Attack: How A Cyberattack Can Compromise an Enterprise Network
By Guillermo Gomez, Vice President of Endpoint Product, WatchGuard Technologies For truly effective network security posture, it’s crucial to protect all of your company’s devices as cyber adversaries can turn […] The post Anatomy Of an Endpoint Attack: How A…
The Critical Role of Training and Phishing Testing in Safeguarding Financial Data
Empowering the Human Firewall: The Bedrock of Cyber Defense By Michael Cocanower, CEO, AdviserCyber The Evolving Cybersecurity Landscape for RIAs and Professionals For Registered Investment Advisers (RIAs) and cybersecurity professionals […] The post The Critical Role of Training and Phishing…
A Transformative Landscape in Legal Technology: From the Past to AI-Powered Future
By Rob Scott, Chief Innovator – Monjur The modern digital era, ripe with unparalleled technological evolutions, is remolding our perceptions and expectations at a pace once thought inconceivable. Among all […] The post A Transformative Landscape in Legal Technology: From…
6 Factors to Consider When Choosing a SIEM Solution
Don’t Settle for Less | Make an Informed Decision By Krunal Mendapara, Chief Technology Officer, Sattrix Group In today’s world, cyber threats are more rampant than ever before. It’s no […] The post 6 Factors to Consider When Choosing a…
2024: The Year of Secure Design
By Stephen de Vries, CEO, IriusRisk In 2023, we saw governments and global cybersecurity agencies begin to put the building blocks in place for secure design and take cyber defense […] The post 2024: The Year of Secure Design appeared…
Fortifying Digital Health Against Cyber Attacks
By Nissim Ben-Saadon, Director of Innovation, CYREBRO In today’s digital era, the healthcare industry stands at the forefront of technological adoption, heavily relying on digital systems such as Electronic Health […] The post Fortifying Digital Health Against Cyber Attacks appeared…
Strengthening Cyber Defense with Threat Intelligence Operations
By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to […] The post Strengthening Cyber Defense with Threat Intelligence Operations…
A Consolidated Approach to Fraud: Bringing Together Risk Insights, Organizations and Technology
By Kimberly Sutherland, vice president, fraud and identity strategy, LexisNexis® Risk Solutions Digital fraud has seen a substantial increase in recent years, mainly due to the sharp rise in digital […] The post A Consolidated Approach to Fraud: Bringing Together…
Cybersecurity or Cyber Resilience: Which Matters More?
Planning Beyond an Enterprise Security Posture and Toward Reliable Business Continuity By Amanda Satterwhite, Managing Director of Cyber Growth & Strategy, Accenture Federal Services Cybercrimes in the United States have […] The post Cybersecurity or Cyber Resilience: Which Matters More?…
Unlocking the Power of Governance in Cybersecurity: NIST CSF 2.0 Introduces ‘Govern’ to Redefine CISO Leadership in 2024
By Shirley Salzman, CEO and Co-Founder, SeeMetrics As all eyes are towards the updated NIST CSF 2.0 publication, some of the spoilers have already been published – now security leaders […] The post Unlocking the Power of Governance in Cybersecurity:…
Will We Ever See Federal Data Breaches End Entirely?
Government cybersecurity may get worse before it gets better. By April Miller, Managing Editor, ReHack Magazine Data breaches are a problem in virtually every industry. However, they carry extra weight […] The post Will We Ever See Federal Data Breaches…
Why Is Hardware More Secure than Software?
The underlying differences between hardware and software when implementing critical cryptosystems. By Kimmo Järvinen, Co-founder and CTO, Xiphera The majority of today’s cryptographic implementations rely on software running on general-purpose […] The post Why Is Hardware More Secure than Software?…
Three Rules of Crisis Management: Lessons from the War in Israel
Crises and challenges are a staple of the technology and cybersecurity industries. While we do our best to plan for growth, setbacks, and business resilience, some crises can’t be anticipated. […] The post Three Rules of Crisis Management: Lessons from…
Rise of the Cyber Supervillain
By Guy Rosefelt, Chief Product Officer, Sangfor Technologies In my Cyber HotSeat Interview with Gary Miliefsky, I made a prediction about the rise of the Cyber Supervillain. This is an […] The post Rise of the Cyber Supervillain appeared first…
Cyber resilience: Safeguarding your enterprise in a rapidly changing world
By Srinivasan CR, Executive Vice President-Cloud and Cybersecurity Services & Chief Digital Officer, Tata Communications In a hyperconnected world, cyberattacks are increasingly common. Just ransomware activity alone was up 50% […] The post Cyber resilience: Safeguarding your enterprise in a…
The Next Generation of Endpoint Security Is Being Reimagined Today
By Vivek Ramachandran, CEO & Founder, SquareX Gone are the days when traditional antivirus solutions were the bulwark of endpoint security. In the past, these antivirus programs were largely sufficient, […] The post The Next Generation of Endpoint Security Is…
The Importance of Data Categorization In A Threat-Filled Landscape
By Dr. Pragyansmita Nayak, Chief Data Scientist, Hitachi Vantara Federal National security is amid a transformative journey driven by technological progress in more ways than one. One of those ways […] The post The Importance of Data Categorization In A…
Spike in Layoffs Pose Serious Cybersecurity Concerns
Different Types of Risk Exposure and Best Practices for Protecting Your Data By Adam Gavish, CEO & Cofounder, DoControl There has been a spike in layoffs over the last few […] The post Spike in Layoffs Pose Serious Cybersecurity Concerns…
Red Sea Crisis and the Risk of Cyber Fallout
By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction As Israel’s military campaign in Gaza continues, the United States as a political sponsor of Israel is contending with regional provocations by […] The post Red Sea Crisis and the Risk of…
Quishing Campaign Exploits Microsoft Open Redirect Vulnerability
Diving into a new sophisticated campaign, exploiting Microsoft’s Open Redirect vulnerability through quishing By Elad Damari, Incident Response Group Manager, Perception Point QR codes can be found almost everywhere, helping […] The post Quishing Campaign Exploits Microsoft Open Redirect Vulnerability…
Overcoming Common Data Security Challenges
By Claude Mandy, Chief Evangelist at Symmetry Systems Organizations depend on data to operate. From day-to-day operations to strategic decisions, data is what keeps an organization ticking. As digital transformation […] The post Overcoming Common Data Security Challenges appeared first…
Detect and Destroy Cyber Threats with Red Piranha
By Adam Bennett, CEO, Red Piranha Red Piranha is Australia’s leading cybersecurity technology and solutions developer, manufacturer, and official member of Team Defence Australia for advanced cybersecurity solutions. Dedicated to […] The post Detect and Destroy Cyber Threats with Red…
Revolutionizing Cybersecurity Recruitment and Networking: The Cyberr.ai Approach
By Laurent Halimi, Founder, Cyberr In the wake of 4 million unfilled cybersecurity positions globally in 2023, conventional hiring practices have proven inadequate. Recognizing this glaring gap, Cyberr.ai has emerged […] The post Revolutionizing Cybersecurity Recruitment and Networking: The Cyberr.ai…
What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform
By Tom Tovar, Co-creator and CEO of Appdome There’s a major battle brewing between platform vs. platformization companies in cybersecurity. On either side, cybersecurity heavyweights are racing to offer fully […] The post What Palo Alto Networks and CrowdStrike Teach…
Strengthening Cyber Defense with Threat Intelligence Operations
By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to […] The post Strengthening Cyber Defense with Threat Intelligence Operations…
Organizational Cybersecurity Hinges on End-User Satisfaction
The critical role end-user experience plays in organizational security By Amitabh Sinha, CEO and Co-Founder of Workspot In an era of sophisticated cyber-attacks, security leaders are feeling the pressure to […] The post Organizational Cybersecurity Hinges on End-User Satisfaction appeared…
Celebrating our 12th Anniversary at RSA conference 2024
It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with us for over a decade. I remember before we went […] The post Celebrating our 12th Anniversary at RSA conference…
Offensive Awakening: The 2024 Shift from Defensive to Proactive Security
Adversarial Cyber Exercises Are The New Mandate By Stephen Gates, Principal SME, Horizon3.ai After observing the cyber threat landscape in 2023, in the coming year we’re going to see a […] The post Offensive Awakening: The 2024 Shift from Defensive…
Navigating the Digital Age: AI’s Crucial Role in Cybersecurity Reinforcement
Harnessing the Power of AI for Advanced Cyber Threat Intelligence and Prevention By Bryan Kissinger, Senior Vice President of Security Solutions and Chief Information Security Officer, Trace3 The digital environment […] The post Navigating the Digital Age: AI’s Crucial Role…
Navigating the API Security Landscape: A CEO’s Perspective on Embedding Zero Trust Principles
By Jyoti Bansal, CEO and Co-Founder, Traceable AI In the dynamic world of digital transformation, I’ve observed a paradigm shift that is reshaping the very fabric of cybersecurity: the monumental […] The post Navigating the API Security Landscape: A CEO’s…
Identity Management Challenges
By Milica D. Djekic There are a plenty of methods to determine someone’s identity and the most convenient cases are through fingerprint, iris detection, DNA and so on, while some […] The post Identity Management Challenges appeared first on Cyber…
Hyperbole, Misinformation, and CyberMonsters Under the Bed
By Ken Westin, Field CISO, Panther Labs This week at the World Economic Forum, there was a panel titled “Are Banks Ready for the Future?” with an esteemed panel of […] The post Hyperbole, Misinformation, and CyberMonsters Under the Bed…
How SaaS-Based Identity Governance Can Help Future-Proof Your Security
Evaluate your needs and prioritize solutions that offer open integration and independence from the single-vendor trend, ensuring robust IGA that aligns with evolving security demands and regulatory requirements By Thomas […] The post How SaaS-Based Identity Governance Can Help Future-Proof…
Hacking and Cybersecurity
Trends to Look Out for in 2024 By Yashin Manraj, CEO, Pvotal Technologies For cybersecurity professionals, remaining effective requires staying on top of a constantly evolving arsenal of attack strategies […] The post Hacking and Cybersecurity appeared first on Cyber…
Stop Managing Identities, Segment them Instead
By Sagie Dulce, VP Research, Zero Networks A Brief History of Identity Management For as long as there have been identities, there have been solutions trying to manage them so […] The post Stop Managing Identities, Segment them Instead appeared…
Good Security Is About Iteration, Not Perfection.
By Craig Burland, CISO, Inversion6 In the dynamic and unpredictable realm of cybersecurity, striving for perfect solutions can be a futile and counterproductive pursuit. There are too many threats to […] The post Good Security Is About Iteration, Not Perfection.…
GitGuardian Researchers Find Thousands of Leaked Secrets in PyPI (Python Package Index) Packages
By Dwayne McDaniel, GitGuardian Developer and Security Advocate, GitGuardian The modern world of DevOps means relying on our code connecting to outside services and components imported at run time. All […] The post GitGuardian Researchers Find Thousands of Leaked Secrets…
Enhancing Cybersecurity Defenses: The role of Voice Cloning in Penetration Testing
By Alex Serdiuk, CEO, Respeecher Newer and more impactful technological advancements are making the quest for foolproof cybersecurity measures more critical than ever. As organizations are doing everything they can […] The post Enhancing Cybersecurity Defenses: The role of Voice…
Data Breach Search Engines
Navigating Access and Security in the Stolen Credentials Landscape By Tom Caliendo, Cybersecurity Reporter, Co-Founder at Brocket Consulting LLC In the last few years, an unprecedented number of stolen login […] The post Data Breach Search Engines appeared first on…
UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know
In an alarming revelation, officials from the Minnesota-based UnitedHealth Group disclosed on Monday that the health insurance and services giant fell victim to a cyberattack, resulting in the breach of […] The post UnitedHealth Group Pays Ransom After Cyberattack: What…
Cybersecurity Trends and Predictions for 2024
By Nick France, CTO at Cybersecurity Leader Sectigo Given the fact that bad actors are always on the prowl, 2024 is off to a fast start with numerous cybersecurity incidents […] The post Cybersecurity Trends and Predictions for 2024 appeared…
AI is Revolutionizing Phishing for Both Sides. What will make the Difference?
Thanks to AI, phishing attacks are better than ever. So is our ability to stop them. By Antonio Sanchez, Principal Cybersecurity Evangelist at Fortra AI has always been a lurking […] The post AI is Revolutionizing Phishing for Both Sides.…
Crafting AI’s Future: Decoding the AI Executive Order
By: Rajat Kohli, Partner at Zinnov There is something to be learned from epic fantasy productions like Harry Potter. That every few years, there will be a gifted wizard who […] The post Crafting AI’s Future: Decoding the AI Executive…
Weighing Down Cyberrisk Options: How to Make Objective Cybersecurity Decisions Without Negatively Impacting the Organization’s IT Teams?
By Mike Starr, CEO of Trackd It’s often paid lip service to (or worse, intentionally neglected), and rarely appreciated, but there’s an operational cost to be paid for security. Security […] The post Weighing Down Cyberrisk Options: How to Make…
Connecting Tech to Black America
By David Lee, Chief Evangelist and Visionary for Tech Diversity As technology rapidly evolves and advances, it can often seem inaccessible and intimidating for the everyday person. For Black Americans […] The post Connecting Tech to Black America appeared first…
The Importance of Cyber Hygiene for Businesses
By Rigo Van den Broeck, Executive Vice President, Cyber Security Product Innovation at Mastercard Cybercrime is set to cost $10.3 trillion worldwide by 2025, and it’s growing fast. It’s a […] The post The Importance of Cyber Hygiene for Businesses…
5 Cybersecurity Resolutions for the New Year
By Roger Spears, Schneider Downs Whenever the new year rolls around, resolutions—to achieve a goal, improve a behavior or continue good practices—abound. And, while many resolutions center personal goals such […] The post 5 Cybersecurity Resolutions for the New Year…
Hybrid Working is Changing How We Think About Security
By Prakash Mana, CEO, Cloudbrink Security will continue to head the list of priorities for CISOs in 2024, but how we secure our enterprises will need rethinking in the face […] The post Hybrid Working is Changing How We Think…
Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.
Nick Shevelyov, Senior Executive Reporter, Cyber Defense Magazine On February 7, 2024, the US Government Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory titled “PRC State-Sponsored Actors Compromise and […] The post Navigating the Cyber Typhoon: Safeguarding Data Amidst…
Adapting to the Deluge of Cybersecurity Data
By Charlie Thomas, CEO, Deepwatch The ever-increasing volume of security data is becoming unmanageable through conventional data analysis, security tools and management techniques. Security teams are deluged with logs, events, […] The post Adapting to the Deluge of Cybersecurity Data…
When Security Collides with Customer Impatience
How Biographic and Biometric Information Work as a Team to Solve the Problem By Raj Ananthanpillai, CEO, Trua Online customers don’t take long to get fidgety. They want their transactions […] The post When Security Collides with Customer Impatience appeared…
Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure
by Lena Allen Introduction In this era of unprecedented technological interconnectedness, the safeguarding of critical infrastructure against cyber threats has ascended to a pinnacle of national security importance for the […] The post Safeguarding America’s Future: Mitigating the Implications of…
DevSecOps Practices for a Secure Cloud
How to start ahead of the curve? By Vishakha Sadhwani, Customer Engineer, Google Cloud In today’s rapidly evolving technological landscape, a strong cultural practice like DevSecOps is essential. It empowers […] The post DevSecOps Practices for a Secure Cloud appeared…
Vendors Beware of the Cybersecurity Audit
By Caroline McCaffery, Co-Founder and CEO of ClearOPS Introduction to Vendor Management Why does every license agreement and data protection addendum, suddenly, include a right for the buyer to perform […] The post Vendors Beware of the Cybersecurity Audit appeared…
How One Industry Exemplifies the Importance Of Cybersecurity In Critical Infrastructure Assurance
And What We Can Learn From It By Brian Hesse, Co-Owner, President, and Chief Executive Officer of PerenniAL Summary Cybersecurity professionals, as with virtually every other organizational function, are always […] The post How One Industry Exemplifies the Importance Of…
Zero Trust Matures, Insider Threat Programs Take Off, and AI Doesn’t Change Things that Much Yet: 2024 Cybersecurity Predictions
By Chris Scheels, VP of Product Marketing at Gurucul How will security analytics, machine learning/AI, and applied data science in the security space evolve in the coming year? Here are […] The post Zero Trust Matures, Insider Threat Programs Take…
Zero Trust: Navigating the Labyrinth of Laws in a Borderless Digital Age
By Jaye Tillson, Director of Strategy & Field CTO, Axis Security The digital landscape, once akin to a fortified city with well-defined perimeters safeguarding precious data, now faces the onslaught […] The post Zero Trust: Navigating the Labyrinth of Laws…