By Dilpreet Singh Bajwa, Senior Consultant, Cyfirma Executive Summary At Cyfirma, we are dedicated to providing you with up-to-date information on the most prevalent threats and tactics used by malicious […] The post The Persistent Danger of Remcos RAT appeared…
Category: Cyber Defense Magazine
Forging A New Era of Invoicing Security
How blockchain-powered software is preventing cyber attacks By Ramon AB, CEO and Co-Founder of Nova Technology Invoicing may not be the first thing that pops up in a conversation around […] The post Forging A New Era of Invoicing Security…
Digital Criminal Ontology; Trading Pistols for Programmers
By James Allman Talbot, Head of Incident Response & Threat Intelligence, Quorum Cyber Since computers were first connected with Ethernet cables, Hollywood started romanticizing hackers. In 1983, WarGames was released. […] The post Digital Criminal Ontology; Trading Pistols for Programmers…
Companies Must Strengthen Cyber Defense in Face of Shifting Threat Actor Strategies
Critical for organizations to understand attackers’ tactics, techniques, and procedures. By Bobby Cornwell, Vice President, Strategic Partnership Enablement & Integration, SonicWall The 2023 mid-year cyber threat report card portends an […] The post Companies Must Strengthen Cyber Defense in Face…
How Are Security Professionals Managing the Good, The Bad and The Ugly of ChatGPT?
By Brett Raybould, EMEA Solutions Architect, Menlo Security Today, headlines surrounding AI tools such as ChatGPT today are largely pessimistic. From the doom-mongering narrative that technologies will put millions out […] The post How Are Security Professionals Managing the Good,…
Anticipation And Agility: Cyber Protection for the 2024 Olympics
By Jacques de La Rivière, CEO, Gatewatcher From July 26 to September 8 next year, Paris will host the 2024 Olympic and Paralympic Games. With less than a year before […] The post Anticipation And Agility: Cyber Protection for the…
Lost in Translation: Mitigating Cybersecurity Risks in Multilingual Environments
By Ofer Tirosh In today’s interconnected, globalized world, the need for communication across multiple languages is more important than ever. But with increased connectivity and linguistic diversity comes a new […] The post Lost in Translation: Mitigating Cybersecurity Risks in…
Halting Hackers on the Holidays 2023 Part II: The Apps You (Shouldn’t) Trust
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine Read Part I first: Halting Hackers on the Holidays 2023 – Cyber Defense Magazine As we count the breaches and total […] The post Halting Hackers on the Holidays 2023 Part…
Why Not Shut Off Access to The Internet Whenever a Password Is Saved
AND then never have to type a password again? By Irwin Gretczko, Founder & CEO, The Hack Blocker So, what about the customer? Let’s think about the banking, brokerage, or […] The post Why Not Shut Off Access to The…
The Corporate Transparency Act: Striking a Pact Between Fact & Privacy Impact
By Tom Aldrich, Chief Strategy Officer, 360 Privacy The Corporate Transparency Act (CTA) became law in the United States as part of the National Defense Authorization Act for FY2021. This […] The post The Corporate Transparency Act: Striking a Pact…
AI in Cybersecurity
Separating Hype from Hyperbole By Avkash Kathiriya “Artificial Intelligence in cybersecurity is like a supercharged virtual fortress armed with a gazillion laser-focused cyber warriors, ready to annihilate any threat with […] The post AI in Cybersecurity appeared first on Cyber…
Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities
By Julie Taylor, Tech Principal, Joyn Holdings LTD & Jacob Dahlman, Team Lead, Joyn Holdings LTD In an increasingly digital world, the safety of our children on the internet has […] The post Safeguarding Children and Vulnerable Groups Online Strategies…
Why It’s More Important Than Ever to Align to The MITRE ATT&CK Framework
By Michael Mumcuoglu, CEO & Co-Founder, CardinalOps As we approach the second half of a year punctuated by ransomware and supply chain attacks, a top concern on nearly everyone’s mind […] The post Why It’s More Important Than Ever to…
Cybersecurity Is Changing: Is the Experience Positive or Negative?
By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies Cybersecurity is Changing: Is the Experience Positive or Negative? Unfortunately, cybersecurity and cybercrime represent the age-old Hollywood trope famously […] The post Cybersecurity Is Changing: Is the Experience Positive…
Navigating The Cybersecurity Horizon: Insights and Takeaways from Blackhat2023
Exploring the Future of Cybersecurity at BlackHat 2023 By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine In our ever-evolving world, where digital threats loom larger and more diverse than […] The post Navigating The Cybersecurity Horizon: Insights and Takeaways…
Understanding The Impact of The SEC’s Cybersecurity Disclosure Regulations
By George Gerchow, CSO and SVP of IT, Sumo Logic Corporate security and compliance teams are scrambling to understand the implications of the U.S. Security and Exchange Commission’s (SEC) recently […] The post Understanding The Impact of The SEC’s Cybersecurity…
The Emergence of AI In the Enterprise: Know the Security Risks
By John Anthony Smith, CEO Conversant Group, and Eli Nussbaum, Managing Director, Conversant Group As businesses strive to keep up with the rapid pace of technological advancement, many are turning […] The post The Emergence of AI In the Enterprise:…
The Human Firewall: Strengthening the Weakest Link in Cybersecurity
By Steve Soukup, CEO, DefenseStorm Innovative technology has revolutionized the way we work and live by unlocking a wealth of new capabilities. As artificial intelligence makes daily operations more efficient […] The post The Human Firewall: Strengthening the Weakest Link…
The Rising Tide of Cybercrime as A Service (CaaS)
By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which, quite alarmingly, is like an online marketplace for cybercriminals and […] The post The Rising Tide of Cybercrime as A…
Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security
By Alan Bavosa, VP of Security Products, Appdome In recent years, mobile apps have surged in popularity providing consumers with instant access to a variety of life essentials such as […] The post Ushering in the Next Phase of Mobile…
The Embedded Systems and The Internet of Things
By Milica D. Djekic The Internet of Things (IoT) is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This […] The post The Embedded Systems and The Internet of…
Increase In Mobile Threats Calls for A Proactive Mindset.
By Nicole Allen, Senior Marketing Executive at Salt Communications Mobile threats are always evolving in the world of business. Threats to mobile security are increasing: More than 60% of cyber […] The post Increase In Mobile Threats Calls for A…
Halting Hackers on the Holidays 2023
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive […] The post Halting Hackers on the Holidays 2023 appeared…
Navigating the Uncertainties of CMMC 2.0: An Urgent Call for Clarity
Unpacking the Complexities, Implications, and Future Outlook of the Cybersecurity Maturity Model Certification By David Brewer, Director of IT/Cybersecurity (Acting), Saalex Solutions, a division of Saalex Corporation In the hyperconnected […] The post Navigating the Uncertainties of CMMC 2.0: An…
IT Modernization Efforts Need to Prioritize Cybersecurity
By Mark Marron, CEO and President, ePlus, Inc. Organizations are increasingly advancing their digital transformation efforts to deliver internal efficiencies, reduce costs, and improve customer experiences. As a side-effect of […] The post IT Modernization Efforts Need to Prioritize Cybersecurity…
From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies
By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security concept in the early 2000s, it was largely focused on […] The post From Network Perimeters to Cloud Access Security…
How to Avoid Common Security Incidents in the Public Cloud
By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the global spending on public cloud services was around $490.3 billion […] The post How to Avoid Common Security Incidents in…
E-mail Compromise
How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of the most beloved cybercriminals’ method for compromise of organization’s data. […] The post E-mail Compromise appeared first on Cyber Defense…
IP network security in the age of DDoS and quantum computing
By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to address the global broadband divide, continued digital transformation with the […] The post IP network security in the age of…
Earthquakes, Cyber Breaches, and Mitigating Disasters through Design
By Archie Agarwal, Founder and CEO of ThreatModeler The Great Earthquake of San Francisco in 1906 caused unbelievable levels of damage in the city, with over 28,000 buildings destroyed and […] The post Earthquakes, Cyber Breaches, and Mitigating Disasters through…
Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market
The health IT security market is experiencing remarkable growth, driven by the pressing need for robust solutions that protect patient privacy, secure data integrity, and ensure the uninterrupted delivery of […] The post Safeguarding Healthcare: A Closer Look at the…
Post-Quantum Cryptography: Safeguarding the Digital Future and Bolstering Security in Critical Sectors
By Maila Zahra, Air University Islamabad and Zia Muhammad, North Dakota State University Post-quantum cryptography aims to develop secure cryptographic algorithms to protect against most quantum attacks. The threats of […] The post Post-Quantum Cryptography: Safeguarding the Digital Future and…
With Americans Traveling More Than Ever Before, It’s Time Businesses Increase Their Mobile Security Efforts
If your colleagues are working from the road, follow these five steps to strengthen your mobile cybersecurity initiatives. By George Tubin, Director of Product Strategy, Cynet The U.S. travel market […] The post With Americans Traveling More Than Ever Before,…
Guarding Against the Insider Threat: Do Your Employees Pose the Greatest Risk?
By Moty Kanias, VP of Cyber Strategy & Alliances, NanoLock Security Great businesses understand that their people are their most important assets. But there is another side to that coin. […] The post Guarding Against the Insider Threat: Do Your…
National Cyber Security Vulnerabilities in The Changing Security Environment
Implications For the Resilience of The NATO Cyber and Information Space By Georgi Atanasov, Subject Matter Expert in Bulgarian ministry of defense In the changed security environment states are seeking […] The post National Cyber Security Vulnerabilities in The Changing…
Visibility Isn’t Enough; It’s What You Do with It That Counts
By Christina Richmond, Chief Strategy and Growth Officer, Inspira Enterprise As cyber risks continue to grow and evolve (here’s looking at you, generative AI) – more and more vulnerabilities are […] The post Visibility Isn’t Enough; It’s What You Do…
4 Key Security Challenges to Address with Confidential Computing
Confidential Computing delivers a variety of security benefits and helps deliver a platform for controlled, compliant activation of sensitive data By Simon Johnson, Senior Principal Engineer at Intel Over the […] The post 4 Key Security Challenges to Address with…
Four Years and a Pandemic Later: Have Agencies Become Cloud Smart?
By James Langley, Master Solutions Consultant, Hitachi Vantara Federal June 2023 marked the four-year anniversary of the release of the final Cloud Smart strategy, which was the government’s update to […] The post Four Years and a Pandemic Later: Have…
Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises
By Walt Szablowski, Founder and Executive Chairman, Eracent Summary: With the increasing frequency and sophistication of cyberattacks in the digital landscape, and the failure of legacy cybersecurity tools and methods, […] The post Embracing Zero Trust Architecture: A Critical Best…
How Google Play Store Security May Fail to Protect Users from Stealthy Malware
Incremental Malicious Update Attack (IMUTA) By Zia Muhammad and Zahid Anwar, Department of Computer Science, NDSU Android is the leading operating system in the smartphone industry with more than 71% […] The post How Google Play Store Security May Fail…
Institutionalizing Awareness to Stop Cyberattacks
By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…
Rethinking SASE: Why Migrate Cybersecurity from Cloud to Browser
By John “JP” Peterson, Chief Product Officer, High Wire Networks Cyberthreats are the scourge of our day. Few would argue, but there’s little consensus about what to do about it. […] The post Rethinking SASE: Why Migrate Cybersecurity from Cloud…
There Are Cyberheroes: THE VIGILANCE MANIFESTO
A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI In the vast expanse of the digital realm, where shadows […] The post There Are Cyberheroes: THE VIGILANCE MANIFESTO appeared…
How Can We Turn a Hacker’s Toolkit Against Them? The Evolution of a Phishing Email
By Jack Chapman, VP of Threat Intelligence, Egress Hackers use many tools at each stage of an attack and with the sophistication of attacks escalating rapidly, it’s vital we understand […] The post How Can We Turn a Hacker’s Toolkit…
Who are the Wagner PMCs of Russia
Is There a Risk of Cyber Fallout? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Executive Summary At the end of June, a Russian mercenary organization known as ‘Wagner’ has mutinied […] The post Who are the Wagner PMCs of Russia…
Quantum Security is National Security
By Andy Manoske, Principal Product Manager of Cryptography and Security Products at HashiCorp Quantum computers will be one of the defining frontiers in computing over the next century. Utilizing the […] The post Quantum Security is National Security appeared first…
The Rising Role of Artificial Intelligence in The Cybersecurity Market
By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) In an era of digital transformation, where organizations rely heavily on technology and data […] The post The Rising Role of Artificial Intelligence in…
A New Ai Arms Race
By Alex Fink, CEO of the Otherweb The internet has seen its share of arms races in recent decades. The advent of viruses resulted in an ongoing battle between those […] The post A New Ai Arms Race appeared first…
Border Crossing: A New Battle Over Governments Extending Information Mandates Beyond National Security to National Interest
By George T. Tziahanas, AGC and VP of Compliance, Archive360 It might seem counterintuitive that in a distributed digital world, the location of data is increasingly important. However, based on […] The post Border Crossing: A New Battle Over Governments…
6 Steps to Accelerate Cybersecurity Incident Response
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must […] The post 6 Steps to Accelerate Cybersecurity Incident Response…
Increase in Phishing Threats among Organizations Has Created a Lot of Opportunities for the Cyber Security Industry
By Koyal Ghosh, Senior Writer, Allied Market Reasearch Growing trend of BYOD and smart assimilation of machine learning, IoT, and AI in several projects have heightened the need for cyber […] The post Increase in Phishing Threats among Organizations Has…
4 Secure Framework Considerations Before Deploying Workloads in The Public Cloud
By Jhilam Biswas, Customer Engineering Manager, Google Cloud Enterprises are adopting public cloud providers like never before. Gartner estimated the global forecasted spend on public cloud services to grow by […] The post 4 Secure Framework Considerations Before Deploying Workloads…
Fend Off the Next Phishing Attack With A “Human Firewall.”
Implement the ‘Mindset – Skillset – Toolset’ triad By Dr. Yvonne Bernard, CTO, Hornetsecurity Spear phishing continues to be the most popular cyberattack, and those companies without proper cybersecurity measures […] The post Fend Off the Next Phishing Attack With…
Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy in A Data-Centric World
By Ani Chaudhuri, CEO, Dasera The EU-US Data Privacy Framework is a product of years of painstaking negotiation, a well-intended attempt to tread the tightrope between national security and personal […] The post Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy…
8 Tips for Best Results in Red-Teaming
By Zac Amos, Features Editor, ReHack In cybersecurity, a red team exercise is a unique way to ensure businesses can respond to cyberattacks appropriately. While it’s generally beneficial, taking extra […] The post 8 Tips for Best Results in Red-Teaming…
Why Compliance Matters When Dealing with AI and Finances
By Saeid Hejazi, Founder, Wally Artificial intelligence has skyrocketed in popularity in recent months, particularly as the widespread availability and use of AI tools such as ChatGPT have spurred greater […] The post Why Compliance Matters When Dealing with AI…
Effective Workplace Education is Built Around Incentives
How Companies Can Personalize Cybersecurity Awareness Training By Asaf Kotsel, CEO, Dcoya The key to a successful workplace education platform is providing compelling behavioral incentives that keep employees engaged and […] The post Effective Workplace Education is Built Around Incentives…
How Cyber Risk Quantification can Help Align CISOs with the Board.
By Lior Bar-Lev, VP Strategy & BizOps, CYE Recently, the American National Institute for Standards and Technology (NIST) released a draft version 2.0 of its “notorious CSF”—the Cybersecurity Framework. The […] The post How Cyber Risk Quantification can Help Align…
Stronger Together: Attack Surface Management and Security Validation
By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as cyberattacks increase in both frequency and severity. The average is […] The post Stronger Together: Attack Surface Management and Security…
How False Positive Rates Impact E-Commerce Conversion Rates: Balancing Security & UX
By Benjamin Fabre, CEO & Co-founder, DataDome In the world of e-commerce, ensuring the security of online transactions is crucial. While bot management systems play a significant role in safeguarding […] The post How False Positive Rates Impact E-Commerce Conversion…
When it Comes to ZTNA, Buyer Beware
By Denny LeCompete, CEO, Portnox With traditional perimeter-based defenses proving inadequate thanks to the rise of remote and hybrid work policies, organizations are turning to the concept of zero trust […] The post When it Comes to ZTNA, Buyer Beware…
Closing The Gap: Resolving Human Error in Cloud Security
By Patrick Pocalyko, GM North America, CYREBRO Cybersecurity technology is critical to securing the cloud but it’s easy to forget that people also play an important role. And the fact […] The post Closing The Gap: Resolving Human Error in…
Tech-Forward Strategies to Effectively Fight Fraud
By Blair Cohen, Founder and President, AuthenticID Not only has digital transformation completely reshaped the way we conduct business, but it has also introduced an onslaught of fraudulent attacks on […] The post Tech-Forward Strategies to Effectively Fight Fraud appeared…
Why You Should Prioritize Your Privacy Policies
By Jason M. Schwent, Senior Counsel, Clark Hill The enactment of the California Online Privacy Protection Act of 2003 created a need for commercial websites in the United States to […] The post Why You Should Prioritize Your Privacy Policies…
Steps for Preparing for a Quantum-Resistant Cryptographic Future
By Timothy Hollebeek, Industry Technology Strategist, DigiCert The rise of post-quantum cryptography (PQC) is shedding light on the pervasive nature of cryptography in our digital world. Virtually every digital connection […] The post Steps for Preparing for a Quantum-Resistant Cryptographic…
What is Malvertising?
Best practices for avoiding novel threats online By Tom McVey, Senior Sales Engineer EMEA, Menlo Security Artificial intelligence has transformed digital marketing. From tracking customer conversations to measuring engagement with […] The post What is Malvertising? appeared first on Cyber…
Secure Remote Access is Not a One Size Fits All Vision
Unlocking the puzzle of OT security By Kevin Kumpf, Cybersecurity Evangelist at Cyolo Secure Remote Access (SRA) is a term that can be technologically defined in many ways, depending on […] The post Secure Remote Access is Not a One…
Lessons Learned: Cyberattack Shutters Five Illinois Healthcare Facilities
Growing Cyber Attacks Pose Existential Threats to Business – Can More Connected And Efficient Security Help Organizations Gain The Upper Hand? By Emily L. Phelps, Director & Cybersecurity Advocate, Cyware […] The post Lessons Learned: Cyberattack Shutters Five Illinois Healthcare…
ISO Certification is the Key to Better Cybersecurity for Business
By Sami Mäkiniemelä, Chief Security Officer, Miradore Cyberattacks are on the rise. Every month it seems like another major business gets hit, with their data and customers compromised at an […] The post ISO Certification is the Key to Better…
From Chaos to Control: The Crucial Role of Cyber Incident Response for SMBs
How to create a well-defined incident response plan By David Chernitzky, Co-founder and CEO, Armour Cybersecurity Cybersecurity incidents can result in significant financial losses, damage to reputation, and compromised customer […] The post From Chaos to Control: The Crucial Role…
Six Must-Focus Cybersecurity Areas in Network Sprawl
By Zachary Folk, Director of Solutions Engineering, Camelot Secure The anticipated benefits of 5G’s faster speed, lower latency, and greater capacity to accommodate many connected devices hold tremendous potential and […] The post Six Must-Focus Cybersecurity Areas in Network Sprawl…
Securing Police Communications: Protecting Communities
By Nicole Allen, Senior Marketing Executive at Salt Communications Probably now more than ever, secure communications are crucial for Policing and the communities they serve. The ability to successfully communicate […] The post Securing Police Communications: Protecting Communities appeared first…
Key Factors and Measures to Address Burnout In The Cybersecurity Field
The underlying threat to organizations By Kunal Purohit, Chief Digital Services Officer, Tech Mahindra In Today’s world Cyber-attacks may be on the rise, but one of the biggest threats to […] The post Key Factors and Measures to Address Burnout…
Cybercrime, Cyber Warfare, and Government Attitudes Towards Cybersecurity
By Avishai Avivi, CISO, SafeBreach The face of cybersecurity is evolving. Cybercrime and its implications have grown into an inescapable fact of our daily lives, affecting everyone from the general […] The post Cybercrime, Cyber Warfare, and Government Attitudes Towards…
Ensuring Container Security: Safeguarding the Future Of Cloud Computing
Containerization has revolutionized the world of software development. By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) In today’s fast-paced digital landscape, containerization […] The post Ensuring Container Security: Safeguarding the Future Of…
Passive Optical Networks: A Game Changer for Now And The Future
By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC The Department of Defense (DoD) faces challenges in meeting network […] The post Passive Optical Networks: A Game Changer for…
Will Zero Trust Replace SD-WAN?
By Jaye Tillson, Director of Strategy, Axis Security A question I get asked frequently is, “Will zero trust replace SD-WAN?”. Let’s take a deeper look at both and assess their […] The post Will Zero Trust Replace SD-WAN? appeared first…
MOVEit’s Ransomware Attack Highlights the State of Cybersecurity
By Ben Smith, Field Chief Technology Officer, NetWitness Vulnerability is a four-letter word in the world of cybersecurity, as one leading business application vendor learned the hard way in May. […] The post MOVEit’s Ransomware Attack Highlights the State of…
Securing the Cloud
Organizational Data Security Strategy – Bring Your Own Key (Byok) By Chris Allen, Senior Solutions Architect, Cryptomathic. Cloud computing is now the norm. Up to 94% of enterprises reportedly use […] The post Securing the Cloud appeared first on Cyber…
How Hacking of The Internet of Things Works In Practice
By Milica D. Djekic The Internet of Things (IoT) represents a collection of devices being capable to talk to each other using the internet as a communication channel. As it’s […] The post How Hacking of The Internet of Things…
Achieving Optimal Zero Trust Maturity: The Role of Data and Governance
By Carolyn Duby, Chief Technology Officer, Cloudera Government Solutions The federal government has placed a stronger emphasis on zero trust since OMB’s federal zero trust strategy memo from the beginning […] The post Achieving Optimal Zero Trust Maturity: The Role…
Bot Security: The Hunt for Vulnerabilities In The Digital Realm And The Burgeoning Need To Safeguard Users, Businesses, And Global Economies
By Mohit Shrivastava, ICT Chief Analyst, Future Market Insights Bots have incorporated themselves into our online experiences in the ever-expanding digital world. Bots have altered the way we engage with […] The post
Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem
Each year, the cybersecurity industry anticipates a handful of landmark research that informs the market regarding benchmarking best practices, understanding emerging trends, and innovation breakthroughs. The annual AT&T Cybersecurity Insights(TM) […] The post Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem appeared…
With Increased Cybersecurity Awareness, Why Does Phishing Still Work?
By Zac Amos, Features Editor, ReHack With the costs of cyberattacks rising and the effects becoming more severe, many decision-makers realize cybersecurity awareness training must be an ongoing part of […] The post With Increased Cybersecurity Awareness, Why Does Phishing…
Why Power Matters in Cyber Protection
Defending power management equipment in an era of more connectivity By James Martin, Global Connectivity Product Manager, Eaton It’s well understood that as digital evolution continues opening doors for greater […] The post Why Power Matters in Cyber Protection appeared…
The Power of Policy: The Best Weapon in Your Defensive Arsenal Isn’t New Tech
By Craig Burland,CISO of Inversion6 The default mental image of a 1970’s Ford Pinto shows a car ablaze with the rear end mildly crumpled and the hapless driver nowhere in […] The post The Power of Policy: The Best Weapon…
The Basics of Digital Forensics
By Milica D. Djekic The digital forensics is a field that assists us to find the clues within a cyberspace regarding some cybercrime or computer breach. The majority of tools […] The post The Basics of Digital Forensics appeared first…
Seeing Through the Vendor Spin: Interpreting the MITRE ATT&CK Evaluation Results
The 2023 MITRE ATT&CK Enterprise Evaluation results were just released and that means one thing – all participating vendors are scrambling to show themselves in the best light possible. This, […] The post Seeing Through the Vendor Spin: Interpreting the…
The rising role of Digital Risk Monitoring solutions in M&A
Venture Capital Firms and Acquiring Companies: The Blind Spot By Kaustubh Medhe, VP, Research & Threat Intelligence Mergers and Acquisitions (M&A) have become a common strategy for companies to scale, […] The post The rising role of Digital Risk Monitoring…
Promoting Safety Across Your Digital Supply Chain
No organisation is an island. Last month’s attack on payroll software Zellis, reminds us how the effects of one breach can very quickly cascade across the business network to third […] The post Promoting Safety Across Your Digital Supply Chain…
No Cloud, No Problems: Why Dynamic DNS Reigns Supreme Over Cloud Applications
By Dan Durrer, Founder & CEO, No-IP Whether you are gaming with friends or game planning your next business venture, it is likely that you are relying on the cloud […] The post No Cloud, No Problems: Why Dynamic DNS…
Simplifying your Approach to the Zero Trust Journey
By Chris Cullerot, Director of Technology and Innovation, iTech AG Earlier this year, the Cybersecurity and Infrastructure Security Agency released its Zero Trust Maturity Model 2.0 to help agencies develop […] The post Simplifying your Approach to the Zero Trust…
Digital Accessibility and Cybersecurity Must Go Hand in Hand
By Dr. Chris Olson In an Increasingly Digital World, Accessibility and Cybersecurity Have Emerged as Significant Factors for Both Individuals and Organizations. Digital accessibility refers to the design and development […] The post Digital Accessibility and Cybersecurity Must Go Hand…
Overcoming Challenges in Cyber Defense Business Naming in The Age of AI
Actionable Naming Strategies for Founders By Darpan Munjal, CEO and Founder, Squadhelp.com Establishing a strong brand identity is key to success in the cyber defense space, and it’s becoming more […] The post Overcoming Challenges in Cyber Defense Business Naming…
Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot
Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through unlimited in-depth investigation, and rapidly respond to incidents. Radiant Security […] The post Publisher’s Spotlight: Radiant Security: Your AI-powered SOC…
Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’ Digital Sanctuaries
by Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine Overwhelming would be an understatement while walking through the 2023 BlackHat USA’s business hall. They featured over 440 of the industry’s leading […] The post Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’…
Six Tips to Ensure a Strong Patch Management Strategy
By Ashley Leonard, CEO and Founder, Syxsense The proliferation of software applications and updates across the market today has put pressure on enterprise security teams to implement strong patch management […] The post Six Tips to Ensure a Strong Patch…
Three Ways to Protect the Data Powering Summer Vacations
By Amit Shaked, CEO and Co-Founder, Laminar The travel industry is in the midst of rapid recovery following the COVID-19 pandemic. In 2022, there were over 747 million passengers who […] The post Three Ways to Protect the Data Powering…
Publishers Spotlight: Nisos: Your Managed Intelligence Partner
Nisos is the Managed Intelligence™ team you need to consider working with to solve your most complex security challenges. They deliver smarter defense and more effective responses against advanced cyber […] The post Publishers Spotlight: Nisos: Your Managed Intelligence Partner…
How to interpret the 2023 MITRE ATT&CK Evaluation results
Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the […] The post How to interpret the 2023 MITRE ATT&CK…