By Andy Manoske, Principal Product Manager of Cryptography and Security Products at HashiCorp Quantum computers will be one of the defining frontiers in computing over the next century. Utilizing the […] The post Quantum Security is National Security appeared first…
Category: Cyber Defense Magazine
The Rising Role of Artificial Intelligence in The Cybersecurity Market
By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) In an era of digital transformation, where organizations rely heavily on technology and data […] The post The Rising Role of Artificial Intelligence in…
A New Ai Arms Race
By Alex Fink, CEO of the Otherweb The internet has seen its share of arms races in recent decades. The advent of viruses resulted in an ongoing battle between those […] The post A New Ai Arms Race appeared first…
Border Crossing: A New Battle Over Governments Extending Information Mandates Beyond National Security to National Interest
By George T. Tziahanas, AGC and VP of Compliance, Archive360 It might seem counterintuitive that in a distributed digital world, the location of data is increasingly important. However, based on […] The post Border Crossing: A New Battle Over Governments…
6 Steps to Accelerate Cybersecurity Incident Response
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must […] The post 6 Steps to Accelerate Cybersecurity Incident Response…
Increase in Phishing Threats among Organizations Has Created a Lot of Opportunities for the Cyber Security Industry
By Koyal Ghosh, Senior Writer, Allied Market Reasearch Growing trend of BYOD and smart assimilation of machine learning, IoT, and AI in several projects have heightened the need for cyber […] The post Increase in Phishing Threats among Organizations Has…
4 Secure Framework Considerations Before Deploying Workloads in The Public Cloud
By Jhilam Biswas, Customer Engineering Manager, Google Cloud Enterprises are adopting public cloud providers like never before. Gartner estimated the global forecasted spend on public cloud services to grow by […] The post 4 Secure Framework Considerations Before Deploying Workloads…
Fend Off the Next Phishing Attack With A “Human Firewall.”
Implement the ‘Mindset – Skillset – Toolset’ triad By Dr. Yvonne Bernard, CTO, Hornetsecurity Spear phishing continues to be the most popular cyberattack, and those companies without proper cybersecurity measures […] The post Fend Off the Next Phishing Attack With…
Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy in A Data-Centric World
By Ani Chaudhuri, CEO, Dasera The EU-US Data Privacy Framework is a product of years of painstaking negotiation, a well-intended attempt to tread the tightrope between national security and personal […] The post Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy…
8 Tips for Best Results in Red-Teaming
By Zac Amos, Features Editor, ReHack In cybersecurity, a red team exercise is a unique way to ensure businesses can respond to cyberattacks appropriately. While it’s generally beneficial, taking extra […] The post 8 Tips for Best Results in Red-Teaming…
Why Compliance Matters When Dealing with AI and Finances
By Saeid Hejazi, Founder, Wally Artificial intelligence has skyrocketed in popularity in recent months, particularly as the widespread availability and use of AI tools such as ChatGPT have spurred greater […] The post Why Compliance Matters When Dealing with AI…
Effective Workplace Education is Built Around Incentives
How Companies Can Personalize Cybersecurity Awareness Training By Asaf Kotsel, CEO, Dcoya The key to a successful workplace education platform is providing compelling behavioral incentives that keep employees engaged and […] The post Effective Workplace Education is Built Around Incentives…
How Cyber Risk Quantification can Help Align CISOs with the Board.
By Lior Bar-Lev, VP Strategy & BizOps, CYE Recently, the American National Institute for Standards and Technology (NIST) released a draft version 2.0 of its “notorious CSF”—the Cybersecurity Framework. The […] The post How Cyber Risk Quantification can Help Align…
Stronger Together: Attack Surface Management and Security Validation
By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as cyberattacks increase in both frequency and severity. The average is […] The post Stronger Together: Attack Surface Management and Security…
How False Positive Rates Impact E-Commerce Conversion Rates: Balancing Security & UX
By Benjamin Fabre, CEO & Co-founder, DataDome In the world of e-commerce, ensuring the security of online transactions is crucial. While bot management systems play a significant role in safeguarding […] The post How False Positive Rates Impact E-Commerce Conversion…
When it Comes to ZTNA, Buyer Beware
By Denny LeCompete, CEO, Portnox With traditional perimeter-based defenses proving inadequate thanks to the rise of remote and hybrid work policies, organizations are turning to the concept of zero trust […] The post When it Comes to ZTNA, Buyer Beware…
Closing The Gap: Resolving Human Error in Cloud Security
By Patrick Pocalyko, GM North America, CYREBRO Cybersecurity technology is critical to securing the cloud but it’s easy to forget that people also play an important role. And the fact […] The post Closing The Gap: Resolving Human Error in…
Tech-Forward Strategies to Effectively Fight Fraud
By Blair Cohen, Founder and President, AuthenticID Not only has digital transformation completely reshaped the way we conduct business, but it has also introduced an onslaught of fraudulent attacks on […] The post Tech-Forward Strategies to Effectively Fight Fraud appeared…
Why You Should Prioritize Your Privacy Policies
By Jason M. Schwent, Senior Counsel, Clark Hill The enactment of the California Online Privacy Protection Act of 2003 created a need for commercial websites in the United States to […] The post Why You Should Prioritize Your Privacy Policies…
Steps for Preparing for a Quantum-Resistant Cryptographic Future
By Timothy Hollebeek, Industry Technology Strategist, DigiCert The rise of post-quantum cryptography (PQC) is shedding light on the pervasive nature of cryptography in our digital world. Virtually every digital connection […] The post Steps for Preparing for a Quantum-Resistant Cryptographic…
What is Malvertising?
Best practices for avoiding novel threats online By Tom McVey, Senior Sales Engineer EMEA, Menlo Security Artificial intelligence has transformed digital marketing. From tracking customer conversations to measuring engagement with […] The post What is Malvertising? appeared first on Cyber…
Secure Remote Access is Not a One Size Fits All Vision
Unlocking the puzzle of OT security By Kevin Kumpf, Cybersecurity Evangelist at Cyolo Secure Remote Access (SRA) is a term that can be technologically defined in many ways, depending on […] The post Secure Remote Access is Not a One…
Lessons Learned: Cyberattack Shutters Five Illinois Healthcare Facilities
Growing Cyber Attacks Pose Existential Threats to Business – Can More Connected And Efficient Security Help Organizations Gain The Upper Hand? By Emily L. Phelps, Director & Cybersecurity Advocate, Cyware […] The post Lessons Learned: Cyberattack Shutters Five Illinois Healthcare…
ISO Certification is the Key to Better Cybersecurity for Business
By Sami Mäkiniemelä, Chief Security Officer, Miradore Cyberattacks are on the rise. Every month it seems like another major business gets hit, with their data and customers compromised at an […] The post ISO Certification is the Key to Better…
From Chaos to Control: The Crucial Role of Cyber Incident Response for SMBs
How to create a well-defined incident response plan By David Chernitzky, Co-founder and CEO, Armour Cybersecurity Cybersecurity incidents can result in significant financial losses, damage to reputation, and compromised customer […] The post From Chaos to Control: The Crucial Role…
Six Must-Focus Cybersecurity Areas in Network Sprawl
By Zachary Folk, Director of Solutions Engineering, Camelot Secure The anticipated benefits of 5G’s faster speed, lower latency, and greater capacity to accommodate many connected devices hold tremendous potential and […] The post Six Must-Focus Cybersecurity Areas in Network Sprawl…
Securing Police Communications: Protecting Communities
By Nicole Allen, Senior Marketing Executive at Salt Communications Probably now more than ever, secure communications are crucial for Policing and the communities they serve. The ability to successfully communicate […] The post Securing Police Communications: Protecting Communities appeared first…
Key Factors and Measures to Address Burnout In The Cybersecurity Field
The underlying threat to organizations By Kunal Purohit, Chief Digital Services Officer, Tech Mahindra In Today’s world Cyber-attacks may be on the rise, but one of the biggest threats to […] The post Key Factors and Measures to Address Burnout…
Cybercrime, Cyber Warfare, and Government Attitudes Towards Cybersecurity
By Avishai Avivi, CISO, SafeBreach The face of cybersecurity is evolving. Cybercrime and its implications have grown into an inescapable fact of our daily lives, affecting everyone from the general […] The post Cybercrime, Cyber Warfare, and Government Attitudes Towards…
Ensuring Container Security: Safeguarding the Future Of Cloud Computing
Containerization has revolutionized the world of software development. By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) In today’s fast-paced digital landscape, containerization […] The post Ensuring Container Security: Safeguarding the Future Of…
Passive Optical Networks: A Game Changer for Now And The Future
By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC The Department of Defense (DoD) faces challenges in meeting network […] The post Passive Optical Networks: A Game Changer for…
Will Zero Trust Replace SD-WAN?
By Jaye Tillson, Director of Strategy, Axis Security A question I get asked frequently is, “Will zero trust replace SD-WAN?”. Let’s take a deeper look at both and assess their […] The post Will Zero Trust Replace SD-WAN? appeared first…
MOVEit’s Ransomware Attack Highlights the State of Cybersecurity
By Ben Smith, Field Chief Technology Officer, NetWitness Vulnerability is a four-letter word in the world of cybersecurity, as one leading business application vendor learned the hard way in May. […] The post MOVEit’s Ransomware Attack Highlights the State of…
Securing the Cloud
Organizational Data Security Strategy – Bring Your Own Key (Byok) By Chris Allen, Senior Solutions Architect, Cryptomathic. Cloud computing is now the norm. Up to 94% of enterprises reportedly use […] The post Securing the Cloud appeared first on Cyber…
How Hacking of The Internet of Things Works In Practice
By Milica D. Djekic The Internet of Things (IoT) represents a collection of devices being capable to talk to each other using the internet as a communication channel. As it’s […] The post How Hacking of The Internet of Things…
Achieving Optimal Zero Trust Maturity: The Role of Data and Governance
By Carolyn Duby, Chief Technology Officer, Cloudera Government Solutions The federal government has placed a stronger emphasis on zero trust since OMB’s federal zero trust strategy memo from the beginning […] The post Achieving Optimal Zero Trust Maturity: The Role…
Bot Security: The Hunt for Vulnerabilities In The Digital Realm And The Burgeoning Need To Safeguard Users, Businesses, And Global Economies
By Mohit Shrivastava, ICT Chief Analyst, Future Market Insights Bots have incorporated themselves into our online experiences in the ever-expanding digital world. Bots have altered the way we engage with […] The post
Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem
Each year, the cybersecurity industry anticipates a handful of landmark research that informs the market regarding benchmarking best practices, understanding emerging trends, and innovation breakthroughs. The annual AT&T Cybersecurity Insights(TM) […] The post Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem appeared…
With Increased Cybersecurity Awareness, Why Does Phishing Still Work?
By Zac Amos, Features Editor, ReHack With the costs of cyberattacks rising and the effects becoming more severe, many decision-makers realize cybersecurity awareness training must be an ongoing part of […] The post With Increased Cybersecurity Awareness, Why Does Phishing…
Why Power Matters in Cyber Protection
Defending power management equipment in an era of more connectivity By James Martin, Global Connectivity Product Manager, Eaton It’s well understood that as digital evolution continues opening doors for greater […] The post Why Power Matters in Cyber Protection appeared…
The Power of Policy: The Best Weapon in Your Defensive Arsenal Isn’t New Tech
By Craig Burland,CISO of Inversion6 The default mental image of a 1970’s Ford Pinto shows a car ablaze with the rear end mildly crumpled and the hapless driver nowhere in […] The post The Power of Policy: The Best Weapon…
The Basics of Digital Forensics
By Milica D. Djekic The digital forensics is a field that assists us to find the clues within a cyberspace regarding some cybercrime or computer breach. The majority of tools […] The post The Basics of Digital Forensics appeared first…
Seeing Through the Vendor Spin: Interpreting the MITRE ATT&CK Evaluation Results
The 2023 MITRE ATT&CK Enterprise Evaluation results were just released and that means one thing – all participating vendors are scrambling to show themselves in the best light possible. This, […] The post Seeing Through the Vendor Spin: Interpreting the…
The rising role of Digital Risk Monitoring solutions in M&A
Venture Capital Firms and Acquiring Companies: The Blind Spot By Kaustubh Medhe, VP, Research & Threat Intelligence Mergers and Acquisitions (M&A) have become a common strategy for companies to scale, […] The post The rising role of Digital Risk Monitoring…
Promoting Safety Across Your Digital Supply Chain
No organisation is an island. Last month’s attack on payroll software Zellis, reminds us how the effects of one breach can very quickly cascade across the business network to third […] The post Promoting Safety Across Your Digital Supply Chain…
No Cloud, No Problems: Why Dynamic DNS Reigns Supreme Over Cloud Applications
By Dan Durrer, Founder & CEO, No-IP Whether you are gaming with friends or game planning your next business venture, it is likely that you are relying on the cloud […] The post No Cloud, No Problems: Why Dynamic DNS…
Simplifying your Approach to the Zero Trust Journey
By Chris Cullerot, Director of Technology and Innovation, iTech AG Earlier this year, the Cybersecurity and Infrastructure Security Agency released its Zero Trust Maturity Model 2.0 to help agencies develop […] The post Simplifying your Approach to the Zero Trust…
Digital Accessibility and Cybersecurity Must Go Hand in Hand
By Dr. Chris Olson In an Increasingly Digital World, Accessibility and Cybersecurity Have Emerged as Significant Factors for Both Individuals and Organizations. Digital accessibility refers to the design and development […] The post Digital Accessibility and Cybersecurity Must Go Hand…
Overcoming Challenges in Cyber Defense Business Naming in The Age of AI
Actionable Naming Strategies for Founders By Darpan Munjal, CEO and Founder, Squadhelp.com Establishing a strong brand identity is key to success in the cyber defense space, and it’s becoming more […] The post Overcoming Challenges in Cyber Defense Business Naming…
Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot
Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through unlimited in-depth investigation, and rapidly respond to incidents. Radiant Security […] The post Publisher’s Spotlight: Radiant Security: Your AI-powered SOC…
Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’ Digital Sanctuaries
by Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine Overwhelming would be an understatement while walking through the 2023 BlackHat USA’s business hall. They featured over 440 of the industry’s leading […] The post Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’…
Six Tips to Ensure a Strong Patch Management Strategy
By Ashley Leonard, CEO and Founder, Syxsense The proliferation of software applications and updates across the market today has put pressure on enterprise security teams to implement strong patch management […] The post Six Tips to Ensure a Strong Patch…
Three Ways to Protect the Data Powering Summer Vacations
By Amit Shaked, CEO and Co-Founder, Laminar The travel industry is in the midst of rapid recovery following the COVID-19 pandemic. In 2022, there were over 747 million passengers who […] The post Three Ways to Protect the Data Powering…
Publishers Spotlight: Nisos: Your Managed Intelligence Partner
Nisos is the Managed Intelligence™ team you need to consider working with to solve your most complex security challenges. They deliver smarter defense and more effective responses against advanced cyber […] The post Publishers Spotlight: Nisos: Your Managed Intelligence Partner…
How to interpret the 2023 MITRE ATT&CK Evaluation results
Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the […] The post How to interpret the 2023 MITRE ATT&CK…
Publishers Spotlight: Omdia Research Risk-based Vulnerability Management Findings
Omdia research finds risk-based vulnerability management set to encompass the vulnerability management market by 2027 The first comparative research into the evolution of the vulnerability management market authored by Omdia […] The post Publishers Spotlight: Omdia Research Risk-based Vulnerability Management…
Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs
CyTwist has launched its Preemptive Cyber Attack Management Platform (PCAM) to enable defenders to expose attacks early and accurately while creating efficiencies in the SOC. They are building a platform […] The post Publishers Spotlight: CyTwist: Defend Forward – Stop…
How Ai Can Be Used as A Tool to Help Monitor for Cybercrimes and Keep Kids Safe From Cyberbullying And Scams
By Ron Kerbs, CEO of Kidas Machine learning (ML) and classifiers have been used as cybersecurity tools for years. Starting in the 1990s, machine learning techniques began detecting known attacks […] The post How Ai Can Be Used as A…
Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection
Dataminr delivers the earliest warnings on high impact events, emerging risks, threats, and other critical information far in advance of other sources. Recognized as one of the world’s leading AI […] The post Publisher’s Spotlight: Dataminr: Real-time AI for Event…
Adaptive DDoS Attacks Get More Sophisticated: How to Beat Attackers’ New Ground Game
By Gary Sockrider, Director, Security Solutions, NETSCOUT The rapid expansion of Internet of Things (IoT) devices, which now number in the billions, not to mention upgrades to network infrastructure and […] The post Adaptive DDoS Attacks Get More Sophisticated: How…
Blockchain Technology: Strengthening Cybersecurity and Protecting Against Password Leaks and Data Breaches
By Thomas Carter, CEO, True I/O In today’s digital landscape, the frequency and severity of password leaks and data breaches have reached unprecedented levels. These incidents pose significant financial and […] The post Blockchain Technology: Strengthening Cybersecurity and Protecting Against…
Bridging the Widening Gap in Cybersecurity Talent: Addressing the Urgent Need for Skilled Professionals
By Travis Doe, Marketing Executive, Secure IT Consult Introduction In today’s digital age, where technology is deeply integrated into our personal and professional lives, the importance of cybersecurity cannot be […] The post Bridging the Widening Gap in Cybersecurity Talent:…
Publisher’s Spotlight: F5: Multi-Cloud Security and Application Delivery
F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations […] The post Publisher’s Spotlight: F5: Multi-Cloud Security and Application…
Boost Your Business Security: How Cyber Insurance Shields You from Cyber Threats
By Simon Pascoe, Director, FD Beck Insurance Brokers As the digital landscape evolves, cyber threats have become a significant concern for all businesses. Protecting your business from these risks is […] The post Boost Your Business Security: How Cyber Insurance…
Has MFA Had Its Day?
By Ori Arbel, CTO, CYREBRO Multi-factor authentication (MFA) has become the authentication standard for nearly all types of businesses – from banks to bicycle rentals and everything in between. Yet, […] The post Has MFA Had Its Day? appeared first…
From AI-driven Defense to Dark Web Threat Intelligence
How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […] The post From AI-driven Defense to Dark Web Threat…
Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio
When it comes to cybersecurity, the landscape is full of single-solution providers, making it easy for unexpected cyberthreats to sneak through the cracks. Fortra is creating a stronger, simpler strategy […] The post Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio appeared…
Cyber: Dealing with a Data Breach
Data breaches are one of the most significant cyber threats organizations face, but when they occur, many businesses do not respond in a manner that reassures their clients or the […] The post Cyber: Dealing with a Data Breach appeared…
AI In Cybersecurity – Risks and Rewards
By Aimei Wei, Co-Founder and CTO, Stellar Cyber The global cybersecurity workforce grew to a record 4.7 million people in 2022, according to an (ISC)2 2022 workforce study, but the same […] The post AI In Cybersecurity – Risks and Rewards…
Publisher’s Spotlight: IANS: Providing Expert Guidance to CISOs and their Teams
IANS Research has been working for the last two decades to create a way for InfoSec practitioners to collaborate in ways that are often difficult in other settings. The IANS […] The post Publisher’s Spotlight: IANS: Providing Expert Guidance to…
The Best of Both Worlds Made Possible with A Hybrid SOC
By Chase Richardson, Principal Lead Consultant, Bridewell The revolving door of cyber-attacks on major organizations continues to turn. Among the most significant of breaches over the last year was a […] The post The Best of Both Worlds Made Possible…
The Role of AI in Cybersecurity
By Alysia Silberg, CEO, Street Global As technology increasingly connects us, people, businesses, and governments are more concerned with Cybersecurity than ever before. The development of Artificial Intelligence (AI) provides […] The post The Role of AI in Cybersecurity appeared…
Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance Program
RegScale is a Modern GRC platform, delivering a simplified, integrated and scalable solution to meet the speed and real-time demands of the digital enterprise. The current manual and document-based approach […] The post Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance…
Publisher’s Spotlight: Security Journey: Secure Coding Training
Security Journey is a secure coding education provider that is focused on addressing the evolving landscape of cybersecurity threats with comprehensive and engaging training. As security awareness has become a […] The post Publisher’s Spotlight: Security Journey: Secure Coding Training…
Zero Trust Security: Pioneering Solutions on a ‘Never Trust, Always Verify’ Principle to Overcome Modern Cyberspace Security Challenges!
By Mohit Shrivastava, Chief Analyst ICT, Future Market Insights Zero trust security is a method of cybersecurity that undertakes that no user or device can be reliable, whether outside or […] The post Zero Trust Security: Pioneering Solutions on a…
Why Cybersecurity for Private Equity Is Urgent Now – And What Funds Can Do to Move the Needle.
Private equity fund-level technology leaders can play an impactful role in protecting their portfolio companies from cyber-attacks, from due diligence through exit By John Hauser, EY Americas Transaction Support – […] The post Why Cybersecurity for Private Equity Is Urgent…
Why CISOs Should Prioritize Cloud Security and Access Management During Digital Transformation Initiatives
By Ameya Khankar, Cybersecurity Consultant for Critical Infrastructure Companies undergoing digital transformation have decided to take the plunge into modernizing their core product offerings. It can be an arduous process, […] The post Why CISOs Should Prioritize Cloud Security and…
The Intersection of OT and IT: Why Unified Cybersecurity is More Important than Ever.
By Craig Burland, CISO, Inversion6 Computer-controlled devices are all around us. From delivery robots to smart buildings to shipping and transportation, computer-controlled devices that affect the physical – not digital […] The post The Intersection of OT and IT: Why…
Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model
Arctic Wolf is a global leader in security operations, enabling customers to manage their cyber risk in the face of modern cyberattacks. Our Arctic Wolf Security Operations Cloud ingests and […] The post Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud…
Publisher’s Spotlight: Normalyze: Data Security for Everything You Build and Run in The Cloud
Normalyze is a pioneering provider of data-first cloud security solutions that help global enterprises secure their data wherever it is stored and prevent data breaches. The Normalyze platform uses patented, […] The post Publisher’s Spotlight: Normalyze: Data Security for Everything…
Publisher’s Spotlight: Cycode: Secure Code to Cloud – Application Security Posture Management (ASPM) at Scale
Cycode’s modern approach to application security enables organizations to effectively secure their cloud-native applications with cost-efficient use of tooling and staff across the SDLC. The Cycode platform makes AppSec tools better […] The post Publisher’s Spotlight: Cycode: Secure Code to Cloud…
Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection
CrowdSec is a modern, collaborative cybersecurity company committed to proactively safeguarding digital assets. With a growing community of 65,000+ active installations contributing to a robust, constantly-updated global IP reputation database […] The post Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection…
The Other Russian War – What Can We Do?
Russian hacking efforts have highlighted weaknesses in U.S. cybersecurity infrastructure. By Jamie Eiseman, George Washington University Russia is invading Ukraine, and Russian hackers are attacking the United States. In October, […] The post The Other Russian War – What Can…
Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter
Today’s cyber attackers are looking beyond network systems and devices to target organizations through digital platforms outside your perimeter. It’s time to detect, expose, and disrupt these external threats to […] The post Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your…
The Billion Dollar Problem: Securing Business Communication in the Financial Sector
By Anurag Lal, President and CEO of NetSfere Securing business communication in the financial services industry is now more than ever a bottom-line issue. That’s because unsecure business communication creates […] The post The Billion Dollar Problem: Securing Business Communication…
The Industrial Control Systems and The Internet of Things
By Milica D. Djekic The industrial control systems (ICS) are usually the part of critical infrastructure to every country or nation. These systems have passed through information era and today […] The post The Industrial Control Systems and The Internet…
A Cloud Security Conundrum: Protecting Your Company from Third-Party Software Supply Chain Gaps
By Vrinda Khurjekar, Senior Director, AMER business, Searce The sky is the limit for cloud migration as Gartner predicts that worldwide end-user spending on public cloud services is forecast to […] The post A Cloud Security Conundrum: Protecting Your Company…
Publisher’s Spotlight: Mitiga: The Next Generation of Cloud Incident Response
Cloud and SaaS have become the new nexus for today’s cyber attackers. Are you ready to respond to a breach? Enter Mitiga: Mitiga is the creator of the world’s first […] The post Publisher’s Spotlight: Mitiga: The Next Generation of…
Publisher’s Spotlight: Cigent: Make Your Data Invisible
Cigent Technologies is a data security company that is renowned for their data protection capabilities. They’ve had a long-standing relationship with the U.S. government and have been a trusted resource […] The post Publisher’s Spotlight: Cigent: Make Your Data Invisible…
SaaS Application Security: Why It Matters and How to Get It Right
Protecting Emerging Startups from Advanced Cyber Threats with Proactive Security Measures By Babar Khan Akhunzada, Founder, SecurityWall Startups are known for their agility, speed, and innovation. They often disrupt entire […] The post SaaS Application Security: Why It Matters and…
Our Risk Perception Is Broken How Do We Fix It?
By Miguel Clarke, GRC and Cybersecurity Lead at Armor and former FBI Special Agent I was first introduced to the concept of cyber security in 2000. Back then, the Dallas […] The post Our Risk Perception Is Broken How Do…
Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries
Oligo Security is one of the leading open source cybersecurity platforms, pioneering the next wave of application security with a runtime solution that is proactive, effective, and frictionless. Oligo found […] The post Publisher’s Spotlight: Oligo: Protect Your Open Source…
Protecting Sensitive Information Within Translation
Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO of Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as […] The post Protecting Sensitive Information Within Translation appeared first…
An Interview with Dasha Deckwerth – Stealth ISS Group
The post An Interview with Dasha Deckwerth – Stealth ISS Group appeared first on Cyber Defense Magazine. This article has been indexed from Cyber Defense Magazine Read the original article: An Interview with Dasha Deckwerth – Stealth ISS Group
Penetration Testing- Shielding the Web Content Against Hacking
Penetration Testing Market size worth over $5.5 Bn by 2031 By Aashi Mishra, Sr. Content Writer, Research Nester In January 2023, a news surfaced the internet that 235 million twitter […] The post Penetration Testing- Shielding the Web Content Against…
Out from the Shadows: SOC Teams Take Their Seat with the “Superheroes”
By Karthik Kannan, Founder and CEO, Anvilogic Watch any superhero movie and it follows the same playbook: the story revolves around the superhero, at the midpoint of the movie there […] The post Out from the Shadows: SOC Teams Take…
Publisher’s Spotlight: Black Hat USA 2023 Closes on Record-Breaking Event in Las Vegas
Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, today announced the successful completion of the in-person component of Black Hat USA 2023. The event […] The post Publisher’s Spotlight: Black Hat USA 2023 Closes…
Network Architecture Mapping Improves Security Posture and Saves Big Bucks
By Matt Honea, Head of Security and Compliance, Forward Networks The challenge to adequately secure a large complex enterprise network, including the infrastructure and critical data assets, continues to plague […] The post Network Architecture Mapping Improves Security Posture and…
OT Under Greater Scrutiny in Global Cybersecurity Regulatory Environment
By Dr. Terence Liu, CEO, TXOne Networks Highly publicized cyberattacks have focused governments globally on re-examining and bolstering their cybersecurity regulations and policies, and it’s not just information technology (IT) […] The post OT Under Greater Scrutiny in Global Cybersecurity…
Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure
The post Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure appeared first on Cyber Defense Magazine. This article has been indexed from Cyber Defense Magazine Read the original article: Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure