By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it has been designed as a personal and social messaging service. […] The post Ditch the Worry – Switch to Secure…
Category: Cyber Defense Magazine
What the Government Can Learn from the Private Sector in Pursuit of Zero Trust
By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order on Improving the Nation’s Cybersecurity, outlining one of the administration’s […] The post What the Government Can Learn from the…
Protecting Your Business and Personal Data
By Brian Lonergan, VP of Product Strategy, Identity Digital October celebrated National Cybersecurity Awareness Month (NCSAM), a time when public and private sectors, along with tribal communities, join forces to […] The post Protecting Your Business and Personal Data appeared…
Navigating Secure Adoption of AI Across Government and Connected Infrastructure
By Gaurav (G.P.) Pal, Founder and CEO, stackArmor This year, artificial intelligence has exploded in popularity across all sectors and industries — including the federal government. AI is being used […] The post Navigating Secure Adoption of AI Across Government…
North Korea–Russia Summit
A new alliance in cyberspace? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction Last month, North Korean leader Kim Jong Un took a rare trip beyond his country’s borders – […] The post North Korea–Russia Summit appeared first on Cyber…
In Pursuit of a Passwordless Future
By Rob Jenks, Senior Vice President of Corporate Strategy, Tanium Many computer users dream of a day when the industry can move past its reliance on passwords to reach a […] The post In Pursuit of a Passwordless Future appeared…
Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT
By Dr. Torsten Staab, PhD, RTX Principal Technical Fellow From September 5th to September 8th of 2023, Billington Cybersecurity hosted its 14th annual Cybersecurity Summit in Washington, D.C. Among my […] The post Insights from Billington Cybersecurity Summit 2023: The…
It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence
By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware to tried and true brute force attacks. At this point, […] The post It’s Time to Tear Down the Barriers…
Building For a More Secure Future: How Developers Can Prioritize Cybersecurity
By Jeremy Butteriss, EGM Ecosystem and Partnerships, Xero An iconic moment in the rise of ecosystems was Steve Ballmer on stage saying ‘developers, developers, developers’ at the 1999 Microsoft .NET […] The post Building For a More Secure Future: How…
How to Create a Threat Hunting Program for Your Business
By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s job is to proactively seek out potential problems and stop […] The post How to Create a Threat Hunting Program…
How To Improve Security Capacities of The Internet of Things?
By Milica D. Djekic The security of the Internet of Things (IoT) is one of the main challenges of today. Many IoT assets could get an easy target to cyber […] The post How To Improve Security Capacities of The…
Developers Hold the New Crown Jewels. Are They Properly Protected?
By Aaron Bray, CEO. Phylum Cybersecurity has changed dramatically in the last four years. During the pandemic, organizations around the globe found themselves faced with accelerating digital transformation initiatives, remote […] The post Developers Hold the New Crown Jewels. Are…
Expect to Fail: How Organizations Can Benefit from a Breach
By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions in digital security. As CISO, you bear primary responsibility for […] The post Expect to Fail: How Organizations Can Benefit…
When the Enemy Is DDoS, Holistic Protection Is a Must
An infinite variety of attack methods require customizable solutions. By Sean Newman, VP/Product Management, Corero Sun Tzu was an exceptional general, strategist, and philosopher, and certainly one of the most […] The post When the Enemy Is DDoS, Holistic Protection…
Keeping SaaS Data Under Wraps
A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business of image and reputation don’t want to get bad publicity. […] The post Keeping SaaS Data Under Wraps appeared first…
Data Sanitization for End-Of-Use Assets
Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe are prioritizing Cybersecurity efforts as threats from cyber criminals are […] The post Data Sanitization for End-Of-Use Assets appeared first…
SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK
Top cybersecurity leaders in the NightDragon Advisor Council provide perspective on 2023 trends and 2024 spending outlook As our digital age continues to expand and become ubiquitous across every piece […] The post SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS…
Fostering Total Trust with A ‘Zero-Trust’ Approach in Financial Services
By Stefan Auerbach, CEO, Utimaco Despite annual spending on cybersecurity by the financial services industry reaching $600 million annually – a figure which is growing every year – trust in […] The post Fostering Total Trust with A ‘Zero-Trust’ Approach…
Chromecast End-of-Life Announcement Highlights Urgent Need for Patch Management Reform Among Hybrid Workers
By Joao Correia, Technical Evangelist for Tuxcare In April this year, Google announced the discontinuation of support for its original Chromecast device. The first-generation Chromecast had been a highly successful […] The post Chromecast End-of-Life Announcement Highlights Urgent Need for…
Common Pitfalls of Running On-Premises SIEM Solutions
By Vinaya Sheshadri, Practice Leader Cyber Security at RiverSafe A good SIEM tool is a necessity for any organisation looking to protect their digital environment. They help security teams be […] The post Common Pitfalls of Running On-Premises SIEM Solutions…
DevOps’ Big Challenge: Limiting Risk Without Impacting Velocity
By Asaf Karas, CTO for JFrog Security Businesses leverage enterprise applications to build a competitive edge and move quickly. These applications need to be built, secured, deployed, and updated on […] The post DevOps’ Big Challenge: Limiting Risk Without Impacting…
Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program
The post Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program appeared first on Cyber Defense Magazine. This article has been indexed from Cyber Defense Magazine Read the original article: Webinar: Managing…
ChatGPT For Enterprises Is Here – But CEOs First Want Data Protections
Amidst the rise of generative AI, business leaders must navigate the delicate balance of adoption, security, and trust. By Apu Pavithran, CEO and Founder, Hexnode At the end of August, […] The post ChatGPT For Enterprises Is Here – But…
The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace
By Anurag Lal, President and CEO of NetSfere Using personal messaging apps for business communication and collaboration is harmless – right? Wrong. This practice, which is unfortunately still widespread in […] The post The Cyber Risk Nightmare and Financial Risk…
How To Combat the Mounting ‘Hacktivist’ Threat
By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less by money than ideology. These ‘hacktivists’ are actively targeting businesses […] The post How To Combat the Mounting ‘Hacktivist’ Threat…
OT Cybersecurity: Safeguarding Building Operations in a Digitized World
By Mirel Sehic, Global Director of Cyber Security, Honeywell In an increasingly digitized world, the looming threat of cyberattacks has cast a shadow over nearly every aspect of our lives. […] The post OT Cybersecurity: Safeguarding Building Operations in a…
7 Steps to Build a Defense in Depth Strategy for Your Home
By Roger Spears – Cybersecurity Project Manager, Schneider Downs One of the primary pillars of cybersecurity is having a “defense in depth” strategy, which means layering defensive security measures to […] The post 7 Steps to Build a Defense in…
Zombie APIs: The Scariest Threat Lurking in The Shadows?
By Dan Hopkins, VP of Engineering at StackHawk IT modernization and digital transformation initiatives, combined with faster software deployment lifecycles, has caused an exponential increase in the size and scale […] The post Zombie APIs: The Scariest Threat Lurking in…
The Crucial Need for a Secure Software Development Lifecycle (SSDLC) in Today’s Digital Landscape
By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation. “Securing the software delivery pipeline is as important as securing the software that is […] The post The Crucial Need for a Secure Software…
Beyond Passwords: AI-Enhanced Authentication in Cyber Defense
By Kathleen Dcruz Why all the noise about artificial intelligence? Now more than ever, AI is becoming part of our lives faster than you could imagine. The question that begs, […] The post Beyond Passwords: AI-Enhanced Authentication in Cyber Defense…
AI And Ad Fraud: Growing Risks for Marketers Using Google’s AI-Based Advertising Campaigns
Google’s Performance Max (PMax) – AI has ignited a flurry of concerns relating to data protection and security, and organisations must act now to prevent further damaging losses. By Mathew […] The post AI And Ad Fraud: Growing Risks for…
Bolster an Organizational Cybersecurity Strategy with External Data Privacy
Enterprise threat protection is missing this critical component By Harry Maugans, CEO, Privacy Bee Companies fight hard to find, cajole and incentivize top talent to run their business. They also […] The post Bolster an Organizational Cybersecurity Strategy with External…
An Age-by-Age Guide to Online Safety for Kids
By Chelsea Hopkins, Social Media Manager, Fasthosts The internet is a fast-changing world of information that allows kids to play, create, browse, and engage with different people from all corners […] The post An Age-by-Age Guide to Online Safety for…
Your #1 Security Initiative in 2024 Should be Operational Resilience
The cyber world is filled with lots of scary threats and new buzzwords, none of them bigger than AI. As boards, CEOs, and security leadership teams decide where to put […] The post Your #1 Security Initiative in 2024 Should…
Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds
Digital transformation has urged organizations across various industries to adopt multi-cloud strategies. They need to find the right balance for security and growth. By Michael Rostov, Entrepreneur and Co-Founder at […] The post Overcoming Multi-Cloud Security Challenges: The Power of…
Artificial Deception: The State Of “AI” In Defense and Offense
By Ken Westin, Field CISO, Panther Labs If you have seen any of my talks, I often say that the infosec industry wouldn’t exist without deception. Although I’ve seen enough […] The post Artificial Deception: The State Of “AI” In…
Master Security by Building on Compliance with A Risk-Centric Approach
By Meghan Maneval, Vice President of Product Strategy and Evangelism, RiskOptics In recent years, a confluence of circumstances has led to a sharp rise in IT risk for many organizations. […] The post Master Security by Building on Compliance with…
Charting a Trustworthy AI Journey
Sound cybersecurity principles for responsible generative AI innovation By Lisa O’Connor, Managing Director—Accenture Security, Cybersecurity R&D, Accenture Labs As companies turn to generative AI to transform business operations, traditional notions […] The post Charting a Trustworthy AI Journey appeared first…
As Digital Payments Explode in Popularity, Cybercriminals are Taking Notice
By Norman Comstock, Managing Director, and Luke Nelson, Managing Director, Cybersecurity Solutions, UHY Consulting With $54 trillion in payments flowing through the world’s leading transaction avenues, the payments space is […] The post As Digital Payments Explode in Popularity, Cybercriminals…
Why Continuous Training Must Come Before The AI-driven SDLC
By Mike Burch, Director of Application Security, Security Journey Despite the hype, generative AI is unlikely to transform the world. But there are sectors where it could significantly disrupt the […] The post Why Continuous Training Must Come Before The…
Understanding the Escalating Threat of Web DDoS Tsunami Attacks
By Uri Dorot, Senior Security Solutions Lead at Radware Whether it’s hacktivists conducting cyberwarfare or ransom-seeking criminals targeting vulnerable firms in financial services, retail, energy, or transportation, a new breed […] The post Understanding the Escalating Threat of Web DDoS…
The Future of Modern Networks Is Automated Threat Intelligence.
By Amit Dhingra, Executive Vice President of Network Services, NTT During the past three years, the enterprise cybersecurity environment has changed drastically. Security threats now come from any number of […] The post The Future of Modern Networks Is Automated…
The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of
By Ivan Shefrin, Executive Director, Managed Security Services, Comcast Business The rise of DDoS attacks is old news. Now, these attacks are becoming more dangerous, targeted, and detrimental as they […] The post The State of DDoS Attacks: Evolving Tactics…
The U. S. Cyber Trust Mark: Providing Assurance That IoT Devices Are Trustworthy
By Mike Nelson, Vice President of Digital Trust, DigiCert It’s safe to say that in 2023, the Internet of Things (IoT) train has left the station and is full speed […] The post The U. S. Cyber Trust Mark: Providing…
URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes
By Zack Schwartz, Chief Revenue Officer, Trustifi As a provider of cybersecurity, we notice when certain trends begin to emerge, judging mostly from the interest and response levels that we […] The post URL Hunting: Proactive Cybersecurity Designed to Improve…
The Evolving Landscape of Ransomware Attacks
2023 – What is new in the world of Ransomware By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Ransomware has been making headlines since 2021, and it continues to do […] The post The Evolving Landscape of Ransomware Attacks appeared…
Sophisticated Cyber Threats Require a New Approach to Digital Security in Healthcare.
By Saeed Valian, Chief Information Security Officer, symplr In the era of modernization, healthcare organizations are pushing for digitalization in their EMR’s. While there are significant benefits here, it does […] The post Sophisticated Cyber Threats Require a New Approach…
The Case Study: The Exploitation of Business Assets
By Milica D. Djekic The role of this case study is to explain how it’s feasible to exploit some business assets using the IoT search engines and some hacking tools. […] The post The Case Study: The Exploitation of Business…
Combatting Social Engineering – The Invisible Threat
By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology […] The post Combatting Social Engineering – The Invisible Threat…
Cyber Strategy Is Not a Synonym for Tech Stack
By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid. Losing can mean going out of business. The cars, marvels […] The post Cyber Strategy Is Not a Synonym for…
Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket
Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices have become indispensable companions in our daily lives, offering us […] The post Mobile Insecurity: Unmasking the Vulnerabilities in Your…
Beyond Mere Compliance
Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and sprinkler systems merely because their installation is required by local […] The post Beyond Mere Compliance appeared first on Cyber…
Stronger Together: Attack Surface Management and Security Validation
By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as cyberattacks increase in both frequency and severity. The average is […] The post Stronger Together: Attack Surface Management and Security…
How to Unify Multiple Analytics Systems to Determine Security Posture and Overall Risk
By Amol Bhagwat, VP, Solutions and Field Engineering at Gurucul As the threat landscape continues to get more complex, security analytics are becoming essential for identifying, preventing and responding to […] The post How to Unify Multiple Analytics Systems to…
How to Overcome the Most Common Challenges with Threat Intelligence
By David Monnier, Chief Evangelist, Team Cymru Fellow What would be your ideal approach to protecting your organization? Knowing exactly what threats are targeting your organization, well before those adversaries […] The post How to Overcome the Most Common Challenges…
The Persistent Danger of Remcos RAT
By Dilpreet Singh Bajwa, Senior Consultant, Cyfirma Executive Summary At Cyfirma, we are dedicated to providing you with up-to-date information on the most prevalent threats and tactics used by malicious […] The post The Persistent Danger of Remcos RAT appeared…
Forging A New Era of Invoicing Security
How blockchain-powered software is preventing cyber attacks By Ramon AB, CEO and Co-Founder of Nova Technology Invoicing may not be the first thing that pops up in a conversation around […] The post Forging A New Era of Invoicing Security…
Digital Criminal Ontology; Trading Pistols for Programmers
By James Allman Talbot, Head of Incident Response & Threat Intelligence, Quorum Cyber Since computers were first connected with Ethernet cables, Hollywood started romanticizing hackers. In 1983, WarGames was released. […] The post Digital Criminal Ontology; Trading Pistols for Programmers…
Companies Must Strengthen Cyber Defense in Face of Shifting Threat Actor Strategies
Critical for organizations to understand attackers’ tactics, techniques, and procedures. By Bobby Cornwell, Vice President, Strategic Partnership Enablement & Integration, SonicWall The 2023 mid-year cyber threat report card portends an […] The post Companies Must Strengthen Cyber Defense in Face…
How Are Security Professionals Managing the Good, The Bad and The Ugly of ChatGPT?
By Brett Raybould, EMEA Solutions Architect, Menlo Security Today, headlines surrounding AI tools such as ChatGPT today are largely pessimistic. From the doom-mongering narrative that technologies will put millions out […] The post How Are Security Professionals Managing the Good,…
Anticipation And Agility: Cyber Protection for the 2024 Olympics
By Jacques de La Rivière, CEO, Gatewatcher From July 26 to September 8 next year, Paris will host the 2024 Olympic and Paralympic Games. With less than a year before […] The post Anticipation And Agility: Cyber Protection for the…
Lost in Translation: Mitigating Cybersecurity Risks in Multilingual Environments
By Ofer Tirosh In today’s interconnected, globalized world, the need for communication across multiple languages is more important than ever. But with increased connectivity and linguistic diversity comes a new […] The post Lost in Translation: Mitigating Cybersecurity Risks in…
Halting Hackers on the Holidays 2023 Part II: The Apps You (Shouldn’t) Trust
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine Read Part I first: Halting Hackers on the Holidays 2023 – Cyber Defense Magazine As we count the breaches and total […] The post Halting Hackers on the Holidays 2023 Part…
Why Not Shut Off Access to The Internet Whenever a Password Is Saved
AND then never have to type a password again? By Irwin Gretczko, Founder & CEO, The Hack Blocker So, what about the customer? Let’s think about the banking, brokerage, or […] The post Why Not Shut Off Access to The…
The Corporate Transparency Act: Striking a Pact Between Fact & Privacy Impact
By Tom Aldrich, Chief Strategy Officer, 360 Privacy The Corporate Transparency Act (CTA) became law in the United States as part of the National Defense Authorization Act for FY2021. This […] The post The Corporate Transparency Act: Striking a Pact…
AI in Cybersecurity
Separating Hype from Hyperbole By Avkash Kathiriya “Artificial Intelligence in cybersecurity is like a supercharged virtual fortress armed with a gazillion laser-focused cyber warriors, ready to annihilate any threat with […] The post AI in Cybersecurity appeared first on Cyber…
Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities
By Julie Taylor, Tech Principal, Joyn Holdings LTD & Jacob Dahlman, Team Lead, Joyn Holdings LTD In an increasingly digital world, the safety of our children on the internet has […] The post Safeguarding Children and Vulnerable Groups Online Strategies…
Why It’s More Important Than Ever to Align to The MITRE ATT&CK Framework
By Michael Mumcuoglu, CEO & Co-Founder, CardinalOps As we approach the second half of a year punctuated by ransomware and supply chain attacks, a top concern on nearly everyone’s mind […] The post Why It’s More Important Than Ever to…
Cybersecurity Is Changing: Is the Experience Positive or Negative?
By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies Cybersecurity is Changing: Is the Experience Positive or Negative? Unfortunately, cybersecurity and cybercrime represent the age-old Hollywood trope famously […] The post Cybersecurity Is Changing: Is the Experience Positive…
Navigating The Cybersecurity Horizon: Insights and Takeaways from Blackhat2023
Exploring the Future of Cybersecurity at BlackHat 2023 By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine In our ever-evolving world, where digital threats loom larger and more diverse than […] The post Navigating The Cybersecurity Horizon: Insights and Takeaways…
Understanding The Impact of The SEC’s Cybersecurity Disclosure Regulations
By George Gerchow, CSO and SVP of IT, Sumo Logic Corporate security and compliance teams are scrambling to understand the implications of the U.S. Security and Exchange Commission’s (SEC) recently […] The post Understanding The Impact of The SEC’s Cybersecurity…
The Emergence of AI In the Enterprise: Know the Security Risks
By John Anthony Smith, CEO Conversant Group, and Eli Nussbaum, Managing Director, Conversant Group As businesses strive to keep up with the rapid pace of technological advancement, many are turning […] The post The Emergence of AI In the Enterprise:…
The Human Firewall: Strengthening the Weakest Link in Cybersecurity
By Steve Soukup, CEO, DefenseStorm Innovative technology has revolutionized the way we work and live by unlocking a wealth of new capabilities. As artificial intelligence makes daily operations more efficient […] The post The Human Firewall: Strengthening the Weakest Link…
The Rising Tide of Cybercrime as A Service (CaaS)
By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which, quite alarmingly, is like an online marketplace for cybercriminals and […] The post The Rising Tide of Cybercrime as A…
Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security
By Alan Bavosa, VP of Security Products, Appdome In recent years, mobile apps have surged in popularity providing consumers with instant access to a variety of life essentials such as […] The post Ushering in the Next Phase of Mobile…
The Embedded Systems and The Internet of Things
By Milica D. Djekic The Internet of Things (IoT) is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This […] The post The Embedded Systems and The Internet of…
Increase In Mobile Threats Calls for A Proactive Mindset.
By Nicole Allen, Senior Marketing Executive at Salt Communications Mobile threats are always evolving in the world of business. Threats to mobile security are increasing: More than 60% of cyber […] The post Increase In Mobile Threats Calls for A…
Halting Hackers on the Holidays 2023
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive […] The post Halting Hackers on the Holidays 2023 appeared…
Navigating the Uncertainties of CMMC 2.0: An Urgent Call for Clarity
Unpacking the Complexities, Implications, and Future Outlook of the Cybersecurity Maturity Model Certification By David Brewer, Director of IT/Cybersecurity (Acting), Saalex Solutions, a division of Saalex Corporation In the hyperconnected […] The post Navigating the Uncertainties of CMMC 2.0: An…
IT Modernization Efforts Need to Prioritize Cybersecurity
By Mark Marron, CEO and President, ePlus, Inc. Organizations are increasingly advancing their digital transformation efforts to deliver internal efficiencies, reduce costs, and improve customer experiences. As a side-effect of […] The post IT Modernization Efforts Need to Prioritize Cybersecurity…
From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies
By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security concept in the early 2000s, it was largely focused on […] The post From Network Perimeters to Cloud Access Security…
How to Avoid Common Security Incidents in the Public Cloud
By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the global spending on public cloud services was around $490.3 billion […] The post How to Avoid Common Security Incidents in…
E-mail Compromise
How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of the most beloved cybercriminals’ method for compromise of organization’s data. […] The post E-mail Compromise appeared first on Cyber Defense…
IP network security in the age of DDoS and quantum computing
By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to address the global broadband divide, continued digital transformation with the […] The post IP network security in the age of…
Earthquakes, Cyber Breaches, and Mitigating Disasters through Design
By Archie Agarwal, Founder and CEO of ThreatModeler The Great Earthquake of San Francisco in 1906 caused unbelievable levels of damage in the city, with over 28,000 buildings destroyed and […] The post Earthquakes, Cyber Breaches, and Mitigating Disasters through…
Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market
The health IT security market is experiencing remarkable growth, driven by the pressing need for robust solutions that protect patient privacy, secure data integrity, and ensure the uninterrupted delivery of […] The post Safeguarding Healthcare: A Closer Look at the…
Post-Quantum Cryptography: Safeguarding the Digital Future and Bolstering Security in Critical Sectors
By Maila Zahra, Air University Islamabad and Zia Muhammad, North Dakota State University Post-quantum cryptography aims to develop secure cryptographic algorithms to protect against most quantum attacks. The threats of […] The post Post-Quantum Cryptography: Safeguarding the Digital Future and…
With Americans Traveling More Than Ever Before, It’s Time Businesses Increase Their Mobile Security Efforts
If your colleagues are working from the road, follow these five steps to strengthen your mobile cybersecurity initiatives. By George Tubin, Director of Product Strategy, Cynet The U.S. travel market […] The post With Americans Traveling More Than Ever Before,…
Guarding Against the Insider Threat: Do Your Employees Pose the Greatest Risk?
By Moty Kanias, VP of Cyber Strategy & Alliances, NanoLock Security Great businesses understand that their people are their most important assets. But there is another side to that coin. […] The post Guarding Against the Insider Threat: Do Your…
National Cyber Security Vulnerabilities in The Changing Security Environment
Implications For the Resilience of The NATO Cyber and Information Space By Georgi Atanasov, Subject Matter Expert in Bulgarian ministry of defense In the changed security environment states are seeking […] The post National Cyber Security Vulnerabilities in The Changing…
Visibility Isn’t Enough; It’s What You Do with It That Counts
By Christina Richmond, Chief Strategy and Growth Officer, Inspira Enterprise As cyber risks continue to grow and evolve (here’s looking at you, generative AI) – more and more vulnerabilities are […] The post Visibility Isn’t Enough; It’s What You Do…
4 Key Security Challenges to Address with Confidential Computing
Confidential Computing delivers a variety of security benefits and helps deliver a platform for controlled, compliant activation of sensitive data By Simon Johnson, Senior Principal Engineer at Intel Over the […] The post 4 Key Security Challenges to Address with…
Four Years and a Pandemic Later: Have Agencies Become Cloud Smart?
By James Langley, Master Solutions Consultant, Hitachi Vantara Federal June 2023 marked the four-year anniversary of the release of the final Cloud Smart strategy, which was the government’s update to […] The post Four Years and a Pandemic Later: Have…
Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises
By Walt Szablowski, Founder and Executive Chairman, Eracent Summary: With the increasing frequency and sophistication of cyberattacks in the digital landscape, and the failure of legacy cybersecurity tools and methods, […] The post Embracing Zero Trust Architecture: A Critical Best…
How Google Play Store Security May Fail to Protect Users from Stealthy Malware
Incremental Malicious Update Attack (IMUTA) By Zia Muhammad and Zahid Anwar, Department of Computer Science, NDSU Android is the leading operating system in the smartphone industry with more than 71% […] The post How Google Play Store Security May Fail…
Institutionalizing Awareness to Stop Cyberattacks
By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…
Rethinking SASE: Why Migrate Cybersecurity from Cloud to Browser
By John “JP” Peterson, Chief Product Officer, High Wire Networks Cyberthreats are the scourge of our day. Few would argue, but there’s little consensus about what to do about it. […] The post Rethinking SASE: Why Migrate Cybersecurity from Cloud…
There Are Cyberheroes: THE VIGILANCE MANIFESTO
A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI In the vast expanse of the digital realm, where shadows […] The post There Are Cyberheroes: THE VIGILANCE MANIFESTO appeared…
How Can We Turn a Hacker’s Toolkit Against Them? The Evolution of a Phishing Email
By Jack Chapman, VP of Threat Intelligence, Egress Hackers use many tools at each stage of an attack and with the sophistication of attacks escalating rapidly, it’s vital we understand […] The post How Can We Turn a Hacker’s Toolkit…
Who are the Wagner PMCs of Russia
Is There a Risk of Cyber Fallout? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Executive Summary At the end of June, a Russian mercenary organization known as ‘Wagner’ has mutinied […] The post Who are the Wagner PMCs of Russia…