Category: Cyber Defense Magazine

How To Combat the Mounting ‘Hacktivist’ Threat

By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less by money than ideology. These ‘hacktivists’ are actively targeting businesses […] The post How To Combat the Mounting ‘Hacktivist’ Threat…

Zombie APIs: The Scariest Threat Lurking in The Shadows?

By Dan Hopkins, VP of Engineering at StackHawk IT modernization and digital transformation initiatives, combined with faster software deployment lifecycles, has caused an exponential increase in the size and scale […] The post Zombie APIs: The Scariest Threat Lurking in…

An Age-by-Age Guide to Online Safety for Kids

By Chelsea Hopkins, Social Media Manager, Fasthosts The internet is a fast-changing world of information that allows kids to play, create, browse, and engage with different people from all corners […] The post An Age-by-Age Guide to Online Safety for…

Charting a Trustworthy AI Journey

Sound cybersecurity principles for responsible generative AI innovation By Lisa O’Connor, Managing Director—Accenture Security, Cybersecurity R&D, Accenture Labs As companies turn to generative AI to transform business operations, traditional notions […] The post Charting a Trustworthy AI Journey appeared first…

Understanding the Escalating Threat of Web DDoS Tsunami Attacks

By Uri Dorot, Senior Security Solutions Lead at Radware Whether it’s hacktivists conducting cyberwarfare or ransom-seeking criminals targeting vulnerable firms in financial services, retail, energy, or transportation, a new breed […] The post Understanding the Escalating Threat of Web DDoS…

The Evolving Landscape of Ransomware Attacks

2023 – What is new in the world of Ransomware By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Ransomware has been making headlines since 2021, and it continues to do […] The post The Evolving Landscape of Ransomware Attacks appeared…

Combatting Social Engineering – The Invisible Threat

By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology […] The post Combatting Social Engineering – The Invisible Threat…

Cyber Strategy Is Not a Synonym for Tech Stack

By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid. Losing can mean going out of business. The cars, marvels […] The post Cyber Strategy Is Not a Synonym for…

Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket

Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices have become indispensable companions in our daily lives, offering us […] The post Mobile Insecurity: Unmasking the Vulnerabilities in Your…

Beyond Mere Compliance

Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and sprinkler systems merely because their installation is required by local […] The post Beyond Mere Compliance appeared first on Cyber…

The Persistent Danger of Remcos RAT

By Dilpreet Singh Bajwa, Senior Consultant, Cyfirma Executive Summary At Cyfirma, we are dedicated to providing you with up-to-date information on the most prevalent threats and tactics used by malicious […] The post The Persistent Danger of Remcos RAT appeared…

Forging A New Era of Invoicing Security

How blockchain-powered software is preventing cyber attacks By Ramon AB, CEO and Co-Founder of Nova Technology Invoicing may not be the first thing that pops up in a conversation around […] The post Forging A New Era of Invoicing Security…

Digital Criminal Ontology; Trading Pistols for Programmers

By James Allman Talbot, Head of Incident Response & Threat Intelligence, Quorum Cyber Since computers were first connected with Ethernet cables, Hollywood started romanticizing hackers. In 1983, WarGames was released. […] The post Digital Criminal Ontology; Trading Pistols for Programmers…

AI in Cybersecurity

Separating Hype from Hyperbole By Avkash Kathiriya “Artificial Intelligence in cybersecurity is like a supercharged virtual fortress armed with a gazillion laser-focused cyber warriors, ready to annihilate any threat with […] The post AI in Cybersecurity appeared first on Cyber…

Cybersecurity Is Changing: Is the Experience Positive or Negative?

By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies Cybersecurity is Changing: Is the Experience Positive or Negative? Unfortunately, cybersecurity and cybercrime represent the age-old Hollywood trope famously […] The post Cybersecurity Is Changing: Is the Experience Positive…

The Rising Tide of Cybercrime as A Service (CaaS)

By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which, quite alarmingly, is like an online marketplace for cybercriminals and […] The post The Rising Tide of Cybercrime as A…

The Embedded Systems and The Internet of Things

By Milica D. Djekic The Internet of Things (IoT) is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This […] The post The Embedded Systems and The Internet of…

Halting Hackers on the Holidays 2023

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive […] The post Halting Hackers on the Holidays 2023 appeared…

IT Modernization Efforts Need to Prioritize Cybersecurity

By Mark Marron, CEO and President, ePlus, Inc. Organizations are increasingly advancing their digital transformation efforts to deliver internal efficiencies, reduce costs, and improve customer experiences. As a side-effect of […] The post IT Modernization Efforts Need to Prioritize Cybersecurity…

How to Avoid Common Security Incidents in the Public Cloud

By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the global spending on public cloud services was around $490.3 billion […] The post How to Avoid Common Security Incidents in…

E-mail Compromise

How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of the most beloved cybercriminals’ method for compromise of organization’s data. […] The post E-mail Compromise appeared first on Cyber Defense…

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…

There Are Cyberheroes: THE VIGILANCE MANIFESTO

A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI In the vast expanse of the digital realm, where shadows […] The post There Are Cyberheroes: THE VIGILANCE MANIFESTO appeared…

Who are the Wagner PMCs of Russia

Is There a Risk of Cyber Fallout? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Executive Summary At the end of June, a Russian mercenary organization known as ‘Wagner’ has mutinied […] The post Who are the Wagner PMCs of Russia…

Quantum Security is National Security

By Andy Manoske, Principal Product Manager of Cryptography and Security Products at HashiCorp Quantum computers will be one of the defining frontiers in computing over the next century. Utilizing the […] The post Quantum Security is National Security appeared first…

A New Ai Arms Race

By Alex Fink, CEO of the Otherweb The internet has seen its share of arms races in recent decades. The advent of viruses resulted in an ongoing battle between those […] The post A New Ai Arms Race appeared first…

6 Steps to Accelerate Cybersecurity Incident Response

Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must […] The post 6 Steps to Accelerate Cybersecurity Incident Response…

8 Tips for Best Results in Red-Teaming

By Zac Amos, Features Editor, ReHack In cybersecurity, a red team exercise is a unique way to ensure businesses can respond to cyberattacks appropriately. While it’s generally beneficial, taking extra […] The post 8 Tips for Best Results in Red-Teaming…

Why Compliance Matters When Dealing with AI and Finances

By Saeid Hejazi, Founder, Wally Artificial intelligence has skyrocketed in popularity in recent months, particularly as the widespread availability and use of AI tools such as ChatGPT have spurred greater […] The post Why Compliance Matters When Dealing with AI…

Effective Workplace Education is Built Around Incentives

How Companies Can Personalize Cybersecurity Awareness Training By Asaf Kotsel, CEO, Dcoya The key to a successful workplace education platform is providing compelling behavioral incentives that keep employees engaged and […] The post Effective Workplace Education is Built Around Incentives…

When it Comes to ZTNA, Buyer Beware

By Denny LeCompete, CEO, Portnox With traditional perimeter-based defenses proving inadequate thanks to the rise of remote and hybrid work policies, organizations are turning to the concept of zero trust […] The post When it Comes to ZTNA, Buyer Beware…

Tech-Forward Strategies to Effectively Fight Fraud

By Blair Cohen, Founder and President, AuthenticID Not only has digital transformation completely reshaped the way we conduct business, but it has also introduced an onslaught of fraudulent attacks on […] The post Tech-Forward Strategies to Effectively Fight Fraud appeared…

Why You Should Prioritize Your Privacy Policies

By Jason M. Schwent, Senior Counsel, Clark Hill The enactment of the California Online Privacy Protection Act of 2003 created a need for commercial websites in the United States to […] The post Why You Should Prioritize Your Privacy Policies…

Steps for Preparing for a Quantum-Resistant Cryptographic Future

By Timothy Hollebeek, Industry Technology Strategist, DigiCert The rise of post-quantum cryptography (PQC) is shedding light on the pervasive nature of cryptography in our digital world. Virtually every digital connection […] The post Steps for Preparing for a Quantum-Resistant Cryptographic…