By Craig Burland, CISO, Inversion6 In the C-Suites and boardrooms of modern enterprises, there’s an unwelcome guest that often disrupts the conviviality of strategic discussions: cyber-truth. Cyber-truth is the unvarnished […] The post Speaking Cyber-Truth: The CISO’s Critical Role in…
Category: Cyber Defense Magazine
Government Communications: The Threats
By Nicole Allen, Marketing Manager at Salt Communications In an age where information flows freely and rapidly, government communications have never been more vulnerable. The digital age has ushered in […] The post Government Communications: The Threats appeared first on…
SASE and Zero Trust: A Powerful Combination
By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Gone are the days when network security resembled a medieval castle. It was protected by a robust drawbridge and moat. In our […] The post SASE and Zero Trust: A Powerful Combination…
A 5-Minute Refresher to Cryptography
(featuring Alice and Bob) by Rajvi Shroff It’s an age-old question. Alice wants to send a message to Bob. But how can Alice send it to Bob without Eve, the […] The post A 5-Minute Refresher to Cryptography appeared first…
Smart Traffic Signals Security in the Era of AI and Smart Cars
Analyzing the Trade-off Between Efficiency and Security in Smart Traffic Signal Technology Integration. by Samridhi Agarwal, Masters Student, CMU Once a simple concept with red, yellow, and green bulbs, traffic […] The post Smart Traffic Signals Security in the Era…
Bridging IT and OT Cybersecurity with AI
Reduce Alerts by 57% with Difenda AIRO By Andrew Hodges, VP Service Delivery & Product Development, Difenda In a technology-driven world, where even the most everyday devices are connected to […] The post Bridging IT and OT Cybersecurity with AI…
Accelerate the path to PCI DSS 4.0 adoption
By Héctor Guillermo Martínez, President of GM Sectec With the release of a new version of the PCI DSS 4.0 Payment Card Industry Data Security Standard, the safety and security […] The post Accelerate the path to PCI DSS 4.0…
Real Time Exposure Detection Is the Missing Element of Every Cybersecurity Strategy
Detecting threats and vulnerabilities in real-time is crucial for an effective cybersecurity strategy to protect against cybercriminals. By Or Shoshani, CEO and Co-founder, Stream Security Cybersecurity teams are often at […] The post Real Time Exposure Detection Is the Missing…
QR Code Phishing Attacks: Threat Actors Are Now Shopping Online with You
Olesia Klevchuk, Director of Email Protection at Barracuda, discusses the prevalence of QR code phishing attacks and how cybercriminals are utilizing quishing to exploit data, download malware, compromise personal devices, […] The post QR Code Phishing Attacks: Threat Actors Are…
Protecting Data in The Final Stretch of The Supply Chain
Building a Secure Last Mile for Global Commerce By Dan O’Toole, Chairman & CEO, Arrive Navigating the Last Mile: Securing the Final Stretch of the Supply Chain In the rapidly […] The post Protecting Data in The Final Stretch of…
Passwords In the Air
By Gautam Hazari, Chief Technology Officer, Sekura.id Imagine, you are sitting in a café, sipping the skillfully crafted coffee by the barista, with your laptop placed on the table in […] The post Passwords In the Air appeared first on…
Organizations Are Shifting Ransomware Defense Tactics, But Malware Is Still the Problem
By Trevor Hilligoss, Senior Director of Security Research at SpyCloud Ransomware attacks are a fact of life – over 72% of global businesses have been impacted by ransomware in 2023. This number […] The post Organizations Are Shifting Ransomware Defense Tactics, But…
Open AI Exec Warns AI is “Extremely Addictive,” Humanity Could Become “Enslaved”
By Sai Mattapalli and Rohan Kalahasty, Co-Founders — Vytal.ai The idea of technology going wrong and turning on its creators is not new. More than 200 years ago, Mary Shelley […] The post Open AI Exec Warns AI is “Extremely…
Manufacturing on the Cyber Frontlines: Enhancing Cybersecurity on the Factory Floor
By Berardino Baratta, CEO, MxD Manufacturing in the United States is changing. Today’s factory floors are a far cry from those we saw in 1980s movies – dark, hostile environments […] The post Manufacturing on the Cyber Frontlines: Enhancing Cybersecurity…
Making Our Infrastructure Resilient: 5 Priorities for Security R&D
By Saurabh Amin, Professor of Civil and Environmental Engineering PI, Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cyberattacks are undoubtedly on the rise; as of September 2023, […] The post Making Our Infrastructure Resilient: 5 Priorities for…
Key Differences in Securing OT & IT Environments
Critical cybersecurity components every security leader must know amid the convergence of IT & OT By Joe O’Donnell, EVP of Corporate Development, Cyolo The increasing cyberattacks against critical sectors, in […] The post Key Differences in Securing OT & IT…
Institutionalizing Awareness to Stop Cyberattacks
By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…
Implementing ZTA: Benefits and Best Practices
By Eric Sugar, President, ProServeIT In an era defined by the relentless advance of digitalization and the ever-expanding interconnectivity of industrial systems, the realm of cybersecurity has been thrust into […] The post Implementing ZTA: Benefits and Best Practices appeared…
Attackers Keep Evolving: Lessons from Expel’s Q2 2023 Quarterly Threat Report
Cyberdefenders plug the holes, so attackers innovate to try to stay ahead. By Aaron Walton, Threat Intel Analyst, Expel Most cyberattackers don’t try to reinvent the wheel: as long as […] The post Attackers Keep Evolving: Lessons from Expel’s Q2…
What are the Essential Skills for Cyber Security Professionals in 2024?
Where should you invest time and resources to drive success when it comes to the must-have skills and tools for senior leaders in the industry. By Sarah Gilchriest, Chief People […] The post What are the Essential Skills for Cyber…
Enhancing The Nation’s Cybersecurity Workforce
Supporting Critical Infrastructure Resilience with Skill-Based Labor By Randall Sandone, Executive Director, Critical Infrastructure Resilience Institute at The Grainger College of Engineering at the University of Illinois Urbana-Champaign “With almost […] The post Enhancing The Nation’s Cybersecurity Workforce appeared first…
Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy
WHY DIGITAL TRUST MATTERS By Lalit Ahluwahli, CEO & Founder, DigitalXForce & iTrustXForce We all know that cybersecurity and privacy are becoming more and more critical with digital transformation. The […] The post Why Digital Trust Has Become More Critical…
Does Zero Trust Improve Productivity?
By Zac Amos, Features Editor, ReHack Zero trust has gained significant attention as an effective approach to secure digital assets. It’s a security framework that’s also believed to impact employee […] The post Does Zero Trust Improve Productivity? appeared first…
Cybersecurity Threats in Global Satellite Internet
By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the […] The post Cybersecurity Threats in Global Satellite Internet appeared…
Classic Information Security Management Errors
How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as an information security expert, I encounter numerous errors, many of […] The post Classic Information Security Management Errors appeared first…
Prioritizing Action After the Threat Headlines
By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially cybersecurity professionals, know the feeling. Minutes – sometimes seconds – […] The post Prioritizing Action After the Threat Headlines appeared…
How to Identify and Respond to End-of-Life and Out-of-Service Operating Systems?
By Chahak Mittal, GRC Manager, Universal Logistics In the ever-changing world of technology, managing end-of-life (EOL) and out-of-service (OOS) operating systems has become a critical concern for organizations of all […] The post How to Identify and Respond to End-of-Life…
Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security
Mobilizing Collective Action for Telecom Signaling Security By Rowland Corr, Vice President and Head of Government Relations, Enea Telecommunications, particularly mobile networks, have become the backbone of our modern, interconnected […] The post Unmasking the Vulnerabilities in Telecom Signaling: A…
Deepfakes and AI’s New Threat to Security
The high cost of free open-source generative software. By Luke Arrigoni, Founder, Loti The rise of deepfake technology poses significant risks to celebrities, high-net-worth individuals, and the general public, with […] The post Deepfakes and AI’s New Threat to Security…
A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM
By Lydia Zhang, President & Co-Founder, Ridge Security Technology Chief Information Security Officer (CISO) Emily Reed is responsible for safeguarding the digital assets of a thriving healthcare organization renowned for […] The post A Tale of Overcoming Cyber Threats with…
Industry Benchmark Report, Issued by The FAIR Institute, Unveils the Dollar Impact of Cyber Incidents
The 2024 Cybersecurity Risk Report Provides CISOs Insights into the Likelihood and Financial Impact of Top Cyber Risks. By Luke Bader, Director, Membership and Programs, FAIR Institute The FAIR Institute, […] The post Industry Benchmark Report, Issued by The FAIR…
Beyond Resumes: Uncovering Hidden Talent at the New Jersey Judiciary
Illuminating the individual beyond the black and white By Darrin Straff, Senior Staffing Consultant, NinjaJobs A Deeper Dive In my recent articles, I’ve discussed the importance of looking beyond resumes […] The post Beyond Resumes: Uncovering Hidden Talent at the…
What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future
By Eddy Zervigon, CEO of Quantum Xchange Cryptography has long been essential in ensuring the protection of data and communication networks. However, even as we rely on it to safeguard […] The post What You Need to Know to Embrace…
How Cloud Solutions Can Lead to Stronger, More Secure IT Operations
By Mike Wiseman, Vice President, Public Sector, Pure Storage In fiscal year 2022, the federal government spent a total of $12.3 billion on cloud goods and services – a 30 […] The post How Cloud Solutions Can Lead to Stronger,…
Addressing Bias in Insider Risk Monitoring
By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […] The post Addressing Bias in Insider Risk Monitoring appeared…
How Autonomous Vehicles are Revolutionizing the Last-Mile Logistics Industry
Cybersecurity will be one of the key concerns as last-mile logistics companies look to enhance efficiency with autonomous vehicles. By Anar Mammadov, CEO, Senpex Technologies Travelers who hail a taxi […] The post How Autonomous Vehicles are Revolutionizing the Last-Mile…
Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’
By Brett Raybould, EMEA Solutions Architect, Menlo Security Phishing remains one of the most prevalent challenges facing organisations, with more than three billion malicious emails estimated to be sent around […] The post Phishing Campaign Exploits Open Redirection Vulnerability In…
The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox
By Ken Cox, President of Hostirian Despite the technological advancements brought by automation and the enhanced capabilities of data analytics that have transformed decision-making processes, the digital age has proved […] The post The Ethics And Privacy Concerns Of Employee…
The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles
By Kevin Beasley, CIO, VAI Increased competition and new regulatory requirements are increasing the tempo of digital transformation among mid-market companies. In fact, Deloitte’s 2023 Mid-Market Technology Trend report found […] The post The Balancing Act for Mid-Market Firms: Navigating…
ImmuniWeb AI Platform
Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […] The post ImmuniWeb AI Platform appeared first on Cyber…
OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft
Securing Operational Technology ACCESS THE RECORDING Kick-start your OT security program, wherever you are in your journey. Gain industry-specific insights into OT cybersecurity challenges and equip yourself with practical strategies […] The post OT Security Q&A for Cybersecurity Leaders with…
Safeguarding the Code That Drives Modern Vehicles
By Soujanya Ain is a Product Marketing Manager at GitGuardian The automotive landscape has evolved dramatically, from mechanical marvels to sophisticated platforms on wheels driven by intricate computer systems. Surprisingly, […] The post Safeguarding the Code That Drives Modern Vehicles…
AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud
By Tim Ward, Chief Strategy Officer, XConnect Robocalls are relentlessly targeting consumers and causing mistrust for the telecom industry as a whole. This is a problem that is accelerating as […] The post AI and the Next Wave of Robocalls:…
Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack
By Carl Cadregari, Executive Vice President, FoxPointe Solutions Regardless of the industry in which they operate, organizations have likely witnessed the wave of destructive MOVEit breaches sweeping the globe during […] The post Building a Secure Data-Protection Infrastructure to Protect…
Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset
By John A. Smith, CSO, Conversant Group If data is the new oil, this holds especially true for law firms as they are wholly dependent on the information they store […] The post Do You Know Where Your Data Is?…
2024 Predictions: The Rise of AI Brings New Security Challenges
By Imperva Executives: Karl Triebes, Lebin Cheng, Peter Klimek, Lynn Marks, and Terry Ray The emergence of generative AI has put new resources in the hands of both attackers and […] The post 2024 Predictions: The Rise of AI Brings…
SIEM vs XDR: Capabilities and Key Differences
We compare the differences in SIEM and XDR’s respective contributions to security By Aimei Wei, Chief Technical Officer and Founder, Stellar Cyber All enterprises comprise vast webs of interconnected devices. […] The post SIEM vs XDR: Capabilities and Key Differences…
What’s The Role of Gaslighting in The Cyber Security Context of Social Engineering?
By Anna Drescher, Freelance Writer and Mental Health Specialist A few years ago, I received an email from Apple stating that someone had made a purchase from my account. They […] The post What’s The Role of Gaslighting in The…
Generative Ai: The Future of Cloud Security
By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation Generative AI: The Future of Cloud Security As the digital landscape undergoes a relentless […] The post Generative Ai: The Future of Cloud Security…
With The World Distracted, China Stirs Trouble in The Asia Pacific
By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction – Thrilla in Manilla President Biden warned that “conflict and chaos could spread to the Indo-Pacific” from late October, and, amidst the […] The post With The World Distracted, China Stirs Trouble…
Wireless Peripheral Devices – Security Risk, Exploits and Remediation
This article covers the importance of Wireless Peripheral Device Security, the risks involved, and ways to remediate the security exploits. By Prathibha Muraleedhara and Akhilesh Bhangepatil Abstract The advancement of […] The post Wireless Peripheral Devices – Security Risk, Exploits…
Bolstering IoT Cybersecurity Amid an Evolving Landscape: A CEO’s Perspective
By Ron Konezny, President & CEO, Digi International The most cybersecurity-savvy members of an organization are typically not the key decision makers. This disconnect may be one of the reasons […] The post Bolstering IoT Cybersecurity Amid an Evolving Landscape:…
Why Companies Are Still Investing in Tech During an Economic Slowdown
By Luke Wallace, VP of Engineering at Bottle Rocket With rising oil prices, higher interest rates, and an economic downturn plaguing Europe and China throughout 2023, recession is looming in […] The post Why Companies Are Still Investing in Tech…
Why Higher Education Is So Vulnerable to Cyber Attacks — And What to Do
By Zac Amos, Features Editor, ReHack Cyberattacks are a growing problem worldwide as they can cause significant damage to any organization, big or small. Higher education institutions are especially vulnerable, […] The post Why Higher Education Is So Vulnerable to…
What You Need to Know About the Cybersecurity Market in 2024
By Doug Saylors, Partner, Co-lead, Cybersecurity, Information Services Group (ISG) The cybersecurity market offers promising opportunities for real-time threat intelligence through advanced technologies such as AI and ML. It’s also […] The post What You Need to Know About the…
Safeguarding Children in the Era of Big Data
By Ron Kerbs, CEO, Kidas In the ever-evolving landscape of cyberspace, 2023 unveiled a concerning trend: major players in the tech industry, including giants like Meta and Discord, were found […] The post Safeguarding Children in the Era of Big…
Securing Space Infrastructure for US And Allied Collaboration
By Kevin Kelly, CEO and Chairman, Arcfield As the role of satellite communication systems in geopolitical conflicts and critical infrastructure sectors continues to expand, concern regarding the security of satellite […] The post Securing Space Infrastructure for US And Allied…
Understand Cyber Insurance: Rising Risks and How to Right-Size Policies
Cyber insurance can be a tricky part of cybersecurity strategy — here’s what to know in today’s security climate By John Reith, Partner Success Manager at DataStream Cyber Insurance Cyber […] The post Understand Cyber Insurance: Rising Risks and How…
Ransom-War Escalation: The New Frontline in Cyber Warfare
By Nissim Ben Saadon, Director of Innovation, CYREBRO High-profile ransomware attacks against government targets in Costa Rica and Peru last year brought a new twist to the concept of cyberwar: […] The post Ransom-War Escalation: The New Frontline in Cyber…
Reducing Burnout and Increasing SOC Retention: How Leaders Can Improve Their Employees’ Lives and Improve Security
By Kayla Williams, CISO, Devo The significant skills gap and burnout of current personnel are two of the most frequent challenges cybersecurity leaders must solve. ISC(2) estimates there’s still a 3.4 […] The post Reducing Burnout and Increasing SOC Retention: How…
Hyperautomation: Revolutionizing the Security Market
By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) Hyperautomation: Revolutionizing the Security Market In today’s digital age, the security landscape is constantly […] The post Hyperautomation: Revolutionizing the Security Market appeared first…
How The Security of The Cloud’s Supply Chain Will Shift in 2024
What we can expect from advanced threat actor groups in the new year. By Jason Martin, Co-founder and Co-CEO at Permiso Security In 2023, we started to witness a change […] The post How The Security of The Cloud’s Supply…
Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program
The post Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program appeared first on Cyber Defense Magazine. This article has been indexed from Cyber Defense Magazine Read the original article: Webinar: Managing…
New Year, New Consumer Demands in Cybersecurity: Navigating the Landscape of Consumer Expectations and App Developer Responsibility in Mobile App Security
By Alan Bavosa, VP of Security Products, Appdome The significant growth and mass adoption of mobile applications has completely transformed the way users engage with brands today. From managing finances […] The post New Year, New Consumer Demands in Cybersecurity:…
Building a Better Perimeter Defense Strategy to Meet the Challenges of 2024
By Yiyi Miao, Chief Product Officer, OPSWAT In the ever-changing domain of cybersecurity, organizations continue to face multifaceted challenges with protecting their digital assets and infrastructure. A new report, written […] The post Building a Better Perimeter Defense Strategy to…
Enhancing PCI DSS Compliance: The Urgent Need for Risk-Based Prioritization
By Ian Robinson, Chief Architect of Titania Keeping U.S. commercial critical national infrastructure (CNI) organizations safe is vital to national security, and it’s never been more top of mind as […] The post Enhancing PCI DSS Compliance: The Urgent Need…
How Businesses Can Manage Cryptocurrency Fraud
With cryptocurrency payments on the rise, businesses must learn how to safeguard against potential risks. By James Hunt, Subject Matter Expert Payments, Feedzai Businesses across the US are seeking innovative […] The post How Businesses Can Manage Cryptocurrency Fraud appeared…
It’s Time to End the Myth of Untouchable Mainframe Security.
By Al Saurette, CEO, MainTegrity, Most large organizations, including 70% of Fortune 500 companies, rely extensively on mainframes for managing their business and IT infrastructure. However, despite the significant role […] The post It’s Time to End the Myth of…
From the SIEM to the Lake: Bridging the Gap for Splunk Customers Post-Acquisition
By Omer Singer, VP of Strategy, Anvilogic The smoke has cleared on Cisco’s largest acquisition ever: that of Splunk for $28 billion in September. This acquisition has added a new […] The post From the SIEM to the Lake: Bridging…
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023
Don’t wait until it’s too late – get cyber insurance today and secure your business for tomorrow. By Zia Muhammad, Cyber Risk Advisor, Onpoint Insurance Services In the current era […] The post Cyber Insurance: A Smart Investment to Protect…
Cyber Resilience – Beyond Cyber Security
In a world where 100% security is not possible, we need to be resilient as we strive to be secure. By James Gorman, Hard2hack.com The evolving landscape of cyber threats […] The post Cyber Resilience – Beyond Cyber Security appeared…
An Interview With Jeffrey Stephens
🔒 Dive into the electrifying world of cyber espionage and the ghost chip with Jeffrey S. Stephens on @CyberDefenseTV! 💻 Unravel the gripping tale of Nick Reagan’s pursuit of “Enemies […] The post An Interview With Jeffrey Stephens appeared first…
Cybersecurity Preparedness 2024
By Chris Leach, Board Advisor for Judy Security The new year is just around the corner. We have had a great Thanksgiving meal and soon our thoughts will turn to […] The post Cybersecurity Preparedness 2024 appeared first on Cyber…
Digital Technologies Power Global Operations but Present Growing Risks
By Charlie Regan, CEO, Nerds on Site As more and more industries and businesses turn to digital technologies in order to power their operations, cyber-attacks present a larger and more […] The post Digital Technologies Power Global Operations but Present…
Evolution and Escalation of Cybersecurity Threats
The Darwinian Effect in the Threat Community By Augusto Barros, Vice President Cyber Security Evangelist at Securonix Among the typical predictions for the upcoming new year, we often see something […] The post Evolution and Escalation of Cybersecurity Threats appeared…
Reshaping the Focus of Cybersecurity
Key Insights from the International Counter Ransomware Initiative Statement By Todd Thorsen, Chief Information Security Officer, CrashPlan Earlier in November, media outlets widely reported the contents of a remarkable joint […] The post Reshaping the Focus of Cybersecurity appeared first…
MGM & Caesars Cyberattacks: Lessons Learned
By Tim Callan, Chief Experience Officer, Sectigo In the aftermath of the MGM and Caesars cyberattacks, many IT professionals are probably asking themselves, am I next? What lessons can businesses […] The post MGM & Caesars Cyberattacks: Lessons Learned appeared…
NIS 2: From Obligation to Opportunity
By Jacques de La Rivière, CEO, Gatewatcher The world of cybersecurity is constantly evolving; not only in talent, products, and technologies, but also in regulatory requirements. As cyber threats evolve […] The post NIS 2: From Obligation to Opportunity appeared…
Top 6 Security Challenges of SMEs
By Michal Gil, Head of Product, CybeReady Small to Medium Enterprises (SMEs) are vital for innovation and economic growth, and their role in larger supply chains makes them an attractive […] The post Top 6 Security Challenges of SMEs appeared…
Is 2024 the Year of Cloud Repatriation?
By Eyal Arazi, cloud security manager at Radware Eyal Arazi, cloud security manager at Radware, looks at why organizations once committed to cloud-first and cloud-only strategies are now reevaluating their […] The post Is 2024 the Year of Cloud Repatriation?…
How A Strong Digital Culture Is the Foundation For Successful Metaverse Exploration
Businesses must become digital-first to understand the emerging realm of the metaverse and develop the innovations that will drive success there. By Jaime McMahon, CDO, LineZero The metaverse is open […] The post How A Strong Digital Culture Is the…
Beyond Traditional Cyber Defences: The Rise of Outcome-Based Security In Modern Business
By Paul Brucciani, Cyber Security Advisor at WithSecure™ Cyber security is no longer just about keeping systems and devices safe, it’s also become central in enabling business to achieve their […] The post Beyond Traditional Cyber Defences: The Rise of…
Ai, Cybersecurity Awareness, And Communication
Moving beyond the hype, are AI cybersecurity solutions as advanced as they claim? By John Trest, Chief Learning Officer, VIPRE Security Group The emergence of numerous AI-driven cybersecurity products emphasizes […] The post Ai, Cybersecurity Awareness, And Communication appeared first…
Addressing Bias in Insider Risk Monitoring
By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […] The post Addressing Bias in Insider Risk Monitoring appeared…
AI in DevSecOps: Moving from A Co-Pilot to An Autopilot
By Stephen Chin, VP of Developer Relations, JFrog What do autonomous driving and software (SW) development have in common? At first glance, not much. But when taking a closer look […] The post AI in DevSecOps: Moving from A Co-Pilot…
Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game
If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure across all sectors, and “be resilient” to the constant onslaught […] The post Prevention Strategies Inevitably Become a Constant Cat-and-Mouse…
AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users
Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at Jumio While AI-driven automation brings benefits, it also gives hackers […] The post AI-Enhanced Identity Fraud: A Mounting Threat to…
AI: The Human Touch in Cybersecurity Recruitment
Harnessing the Digital Scout for Cybersecurity’s Future By Darrin Straff, Senior Staffing Consultant, NinjaJobs Introduction: In the digital age, where cybersecurity threats are ever-evolving, AI’s role in strengthening our defenses […] The post AI: The Human Touch in Cybersecurity Recruitment…
Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors
A Vital Set of Cybersecurity Best Practices By John Funk, Creative Consultant, SevenAtoms A new cybersecurity mandate being rolled out by the Pentagon has implications that reach beyond the military […] The post Why Cybersecurity Maturity Model Certification (CMMC) Matters…
The Tech Jobs That AI Will Not Disrupt
By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to […] The post The Tech Jobs That AI Will Not…
3 New Risks That CISOs Will Face in 2024
By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere are increasingly vigilant about how their data is being gathered […] The post 3 New Risks That CISOs Will Face…
How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance
Steps To Implement Cyber Controls and Processes By Juliana Spofford, General Counsel and Chief Privacy Officer, Aidentified In today’s tech world, it is often difficult to determine which businesses you […] The post How Small and Mid-Sized Businesses Can Achieve…
Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments
By Victor Atkins, Director | Cybersecurity, 1898 & Co. The rise in the age of digitalization has provided numerous benefits for modern society, from the ability to conduct a telehealth […] The post Closing the Gap: Safeguarding Critical Infrastructure’s IT…
The Crumbling Castle
By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy involved building a strong perimeter around the corporate network, like […] The post The Crumbling Castle appeared first on Cyber…
The Cybersecurity Bridge: A Necessary Connection for IT and Communications
By Jeff Hahn, principal of Hahn, and Kenneth Holley, Principal and chairman of Silent Quadrant With the increasing unpredictability and sophistication of cyber threats, IT and communications departments must align […] The post The Cybersecurity Bridge: A Necessary Connection for…
Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines
SEC’s New Guidelines Prompt Proactive Cyber Risk Management By Meghan Maneval, Director of Technical Product Management at RiskOptics Recently, the Securities and Exchange Commission (SEC) adopted rules about the handling […] The post Three Things to Know About the New…
Striking The Right Balance: Cloud and Cyber Priorities for SMEs
By Mark Allen, Head of cyber, CloudCoCo As small and medium-sized enterprises (SMEs) embark on their digitalization journey, they face a crucial dilemma: Should they prioritize the adoption of cloud […] The post Striking The Right Balance: Cloud and Cyber…
Shifting Left Means Shifting Smart: Managing Software Risk With ASPM
By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up software delivery, security practices have had to evolve. Development teams […] The post Shifting Left Means Shifting Smart: Managing Software…
Protecting Critical Infrastructure from Cyber Attack
The enemy is using cyber weapons that are hard to track and even harder to fully attribute to an adversary, companies need to act now By Richard Staynings, Chief Security […] The post Protecting Critical Infrastructure from Cyber Attack appeared…
Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead
By Craig Burland, CISO, Inversion6 In a world driven by technology, innovation and rapid change, companies often find themselves touting the mantra of “ruthless prioritization.” The idea sounds pragmatic: with […] The post Ruthless Prioritization Is a Myth: Aim For…