Category: Cyber Defense Magazine

The TikTok Ban Spells Trouble for Chinese IoT

What businesses should do today to prepare for likely bans across Chinese tech tomorrow By Carsten Rhod Gregersen, Founder and CEO of Nabto It’s happening. Following years of rumors, The […] The post The TikTok Ban Spells Trouble for Chinese…

AI Can Bridge the Gap of Ineffective MDR Tools

By Orion Cassetto, Head of Marketing, Radiant Security Last year, nearly one-third of organizations suffered breaches, prompting security professionals to reevaluate the performance of their existing managed detection and response […] The post AI Can Bridge the Gap of Ineffective…

Spotlight on Riskassure

Riskaware by Riskassure Solves a Unique Problem By Dan K. Anderson vCISO and On-Call Roving Reporter, CyberDefense Magazine In preparing for this article, I met with Larry Faragalli, Keith Huckaby, […] The post Spotlight on Riskassure appeared first on Cyber…

Applied Human Threat Management in Cyber Industry

By Milica D. Djekic The high-tech industry is an extremely emerging environment dealing with the sophisticated and skilled workforce that is recruited to develop an ultimate cutting-edge technology, so far. […] The post Applied Human Threat Management in Cyber Industry…

Limits of Automation

How Interactive Sandboxing Can Benefit Your Organization By Vlad Ananin, Technical Writer at Any.Run The current rate and complexity of cyber attacks are making it harder than ever for companies […] The post Limits of Automation appeared first on Cyber…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to […] The post Why Do Hackers Love Cryptocurrency? appeared first…

Cryptographic Protocol Challenges

By Milica D. Djekic The communication protocol is an information exchange method where data are transferred only if two or more networking devices deal with a set of the rules […] The post Cryptographic Protocol Challenges appeared first on Cyber…

Cybersecurity Concerns Facing the 2024 U.S. Elections

By Zac Amos, Features Editor, ReHack Cybersecurity oversights are making infrastructure in the U.S. the most fragile it has been in history. Hackers are constantly developing new strategies to topple […] The post Cybersecurity Concerns Facing the 2024 U.S. Elections…

CES: AI at the Forefront of Cybersecurity’s Future

Examining the Increased Use of Artificial Intelligence in Cybersecurity By Matthew Taylor, Vice President of Projects and Engineering, MxD The annual Consumer Electronics Show (CES) is the world’s largest consumer […] The post CES: AI at the Forefront of Cybersecurity’s…

Relying on the Unreliable

The Hidden Costs of Facial Recognition Technology By Tinglong Dai Bernard T. Ferrari Professor of Business The Carey Business School at Johns Hopkins University With generative AI dominating the tech […] The post Relying on the Unreliable appeared first on…

CTI for M&A

Active dark web Intelligence to aid M&A  By Shawn Loveland, COO, Resecurity Every industry-leading company has gone through mergers and acquisitions (M&A) at some point to acquire a competitor, expand […] The post CTI for M&A appeared first on Cyber…

Is Zero Trust Enough?

Why Zero Access Is a Better Way To Protect Your Backup Infrastructure By Greg Tevis, Vice President of Strategy, Cobalt Iron Backup has always been seen as the last line […] The post Is Zero Trust Enough? appeared first on…

Becoming Resilient to The Cyber Incidents of Today And Tomorrow

By Theresa Le, Chief Claims Officer, Cowbell As cyber threats escalate and evolve worldwide, businesses must ensure their foundations are solid to withstand potential cyber incidents. Developing organizational resilience involves […] The post Becoming Resilient to The Cyber Incidents of…

6 Factors to Consider When Choosing a SIEM Solution

Don’t Settle for Less | Make an Informed Decision By Krunal Mendapara, Chief Technology Officer, Sattrix Group In today’s world, cyber threats are more rampant than ever before. It’s no […] The post 6 Factors to Consider When Choosing a…

2024: The Year of Secure Design

By Stephen de Vries, CEO, IriusRisk In 2023, we saw governments and global cybersecurity agencies begin to put the building blocks in place for secure design and take cyber defense […] The post 2024: The Year of Secure Design appeared…

Fortifying Digital Health Against Cyber Attacks

By Nissim Ben-Saadon, Director of Innovation, CYREBRO In today’s digital era, the healthcare industry stands at the forefront of technological adoption, heavily relying on digital systems such as Electronic Health […] The post Fortifying Digital Health Against Cyber Attacks appeared…

Cybersecurity or Cyber Resilience: Which Matters More?

Planning Beyond an Enterprise Security Posture and Toward Reliable Business Continuity By Amanda Satterwhite, Managing Director of Cyber Growth & Strategy, Accenture Federal Services Cybercrimes in the United States have […] The post Cybersecurity or Cyber Resilience: Which Matters More?…

Will We Ever See Federal Data Breaches End Entirely?

Government cybersecurity may get worse before it gets better. By April Miller, Managing Editor, ReHack Magazine Data breaches are a problem in virtually every industry. However, they carry extra weight […] The post Will We Ever See Federal Data Breaches…

Why Is Hardware More Secure than Software?

The underlying differences between hardware and software when implementing critical cryptosystems. By Kimmo Järvinen, Co-founder and CTO, Xiphera The majority of today’s cryptographic implementations rely on software running on general-purpose […] The post Why Is Hardware More Secure than Software?…

Rise of the Cyber Supervillain

By Guy Rosefelt, Chief Product Officer, Sangfor Technologies In my Cyber HotSeat Interview with Gary Miliefsky, I made a prediction about the rise of the Cyber Supervillain. This is an […] The post Rise of the Cyber Supervillain appeared first…

Spike in Layoffs Pose Serious Cybersecurity Concerns

Different Types of Risk Exposure and Best Practices for Protecting Your Data By Adam Gavish, CEO & Cofounder, DoControl There has been a spike in layoffs over the last few […] The post Spike in Layoffs Pose Serious Cybersecurity Concerns…

Red Sea Crisis and the Risk of Cyber Fallout

By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction As Israel’s military campaign in Gaza continues, the United States as a political sponsor of Israel is contending with regional provocations by […] The post Red Sea Crisis and the Risk of…

Quishing Campaign Exploits Microsoft Open Redirect Vulnerability

Diving into a new sophisticated campaign, exploiting Microsoft’s Open Redirect vulnerability through quishing By Elad Damari, Incident Response Group Manager, Perception Point QR codes can be found almost everywhere, helping […] The post Quishing Campaign Exploits Microsoft Open Redirect Vulnerability…

Overcoming Common Data Security Challenges

By Claude Mandy, Chief Evangelist at Symmetry Systems Organizations depend on data to operate. From day-to-day operations to strategic decisions, data is what keeps an organization ticking. As digital transformation […] The post Overcoming Common Data Security Challenges appeared first…

Detect and Destroy Cyber Threats with Red Piranha

By Adam Bennett, CEO, Red Piranha Red Piranha is Australia’s leading cybersecurity technology and solutions developer, manufacturer, and official member of Team Defence Australia for advanced cybersecurity solutions. Dedicated to […] The post Detect and Destroy Cyber Threats with Red…

Organizational Cybersecurity Hinges on End-User Satisfaction

The critical role end-user experience plays in organizational security By Amitabh Sinha, CEO and Co-Founder of Workspot In an era of sophisticated cyber-attacks, security leaders are feeling the pressure to […] The post Organizational Cybersecurity Hinges on End-User Satisfaction appeared…

Identity Management Challenges

By Milica D. Djekic There are a plenty of methods to determine someone’s identity and the most convenient cases are through fingerprint, iris detection, DNA and so on, while some […] The post Identity Management Challenges appeared first on Cyber…

Hacking and Cybersecurity

Trends to Look Out for in 2024 By Yashin Manraj, CEO, Pvotal Technologies For cybersecurity professionals, remaining effective requires staying on top of a constantly evolving arsenal of attack strategies […] The post Hacking and Cybersecurity appeared first on Cyber…

Stop Managing Identities, Segment them Instead

By Sagie Dulce, VP Research, Zero Networks A Brief History of Identity Management  For as long as there have been identities, there have been solutions trying to manage them so […] The post Stop Managing Identities, Segment them Instead appeared…

Good Security Is About Iteration, Not Perfection.

By Craig Burland, CISO, Inversion6 In the dynamic and unpredictable realm of cybersecurity, striving for perfect solutions can be a futile and counterproductive pursuit. There are too many threats to […] The post Good Security Is About Iteration, Not Perfection.…

Data Breach Search Engines

Navigating Access and Security in the Stolen Credentials Landscape By Tom Caliendo, Cybersecurity Reporter, Co-Founder at Brocket Consulting LLC In the last few years, an unprecedented number of stolen login […] The post Data Breach Search Engines appeared first on…

Cybersecurity Trends and Predictions for 2024

By Nick France, CTO at Cybersecurity Leader Sectigo Given the fact that bad actors are always on the prowl, 2024 is off to a fast start with numerous cybersecurity incidents […] The post Cybersecurity Trends and Predictions for 2024 appeared…

Connecting Tech to Black America

By David Lee, Chief Evangelist and Visionary for Tech Diversity As technology rapidly evolves and advances, it can often seem inaccessible and intimidating for the everyday person. For Black Americans […] The post Connecting Tech to Black America appeared first…

The Importance of Cyber Hygiene for Businesses

By Rigo Van den Broeck, Executive Vice President, Cyber Security Product Innovation at Mastercard Cybercrime is set to cost $10.3 trillion worldwide by 2025, and it’s growing fast. It’s a […] The post The Importance of Cyber Hygiene for Businesses…

5 Cybersecurity Resolutions for the New Year

By Roger Spears, Schneider Downs Whenever the new year rolls around, resolutions—to achieve a goal, improve a behavior or continue good practices—abound. And, while many resolutions center personal goals such […] The post 5 Cybersecurity Resolutions for the New Year…

Adapting to the Deluge of Cybersecurity Data

By Charlie Thomas, CEO, Deepwatch The ever-increasing volume of security data is becoming unmanageable through conventional data analysis, security tools and management techniques. Security teams are deluged with logs, events, […] The post Adapting to the Deluge of Cybersecurity Data…

When Security Collides with Customer Impatience

How Biographic and Biometric Information Work as a Team to Solve the Problem By Raj Ananthanpillai, CEO, Trua Online customers don’t take long to get fidgety. They want their transactions […] The post When Security Collides with Customer Impatience appeared…

DevSecOps Practices for a Secure Cloud

How to start ahead of the curve? By Vishakha Sadhwani, Customer Engineer, Google Cloud In today’s rapidly evolving technological landscape, a strong cultural practice like DevSecOps is essential. It empowers […] The post DevSecOps Practices for a Secure Cloud appeared…

Vendors Beware of the Cybersecurity Audit

By Caroline McCaffery, Co-Founder and CEO of ClearOPS Introduction to Vendor Management Why does every license agreement and data protection addendum, suddenly, include a right for the buyer to perform […] The post Vendors Beware of the Cybersecurity Audit appeared…

Three Key Threats Fueling the Future of Cyber Attacks

By Rishi Baviskar, Global Head of Cyber Risk Consulting at Allianz Commercial Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat […] The post Three Key Threats Fueling the Future of…

The Quantum Shift

Preparing Cybersecurity for a New Era By Sercan Okur, VP of Technology, NextRay In contrast to my previous pieces, I intend to commence this piece with a hypothetical calamitous situation. […] The post The Quantum Shift appeared first on Cyber…

CISO Life: the Good, the Bad, the Ugly

What type of things can go wrong with Senior Leadership, the Org, Legal, HR, etc. by Dan K. Anderson In today’s hectic Cyber world, the role of CISO continues to […] The post CISO Life: the Good, the Bad, the…