(Zero Trust Network Access) By Howie Robleza, Freelance Writer, Avigilon One of the most significant worries for business leaders in the current climate is the potential for an internal security […] The post 7 Benefits of Implementing ZTNA appeared first…
Category: Cyber Defense Magazine
Biometric as a Service (BaaS) – An Opinion Piece
By Mohit Shrivastava, Chief Analyst ICT, Future Market Insights Biometric as a service (BaaS) works best as a striking alternative to other outmoded biometric software models. It becomes easy for […] The post Biometric as a Service (BaaS) – An…
Why Inadequate Investment in Cybersecurity is a False Economy
By Luke Dash, CEO, ISMS.online Already suffering the most cyberattacks than any other European country [RH1], the UK looks set to experience a proliferation of vulnerabilities as businesses struggle to […] The post Why Inadequate Investment in Cybersecurity is a…
The Power of AI In Today’s Rapidly Evolving Financial Crime Landscape
By Pedro Barata, Chief Product Officer, Feedzai Fraud has plagued the financial services sector for years. In today’s rapidly evolving digital landscape, financial institutions are under increasing pressure to safeguard […] The post The Power of AI In Today’s Rapidly…
Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023
By Sanjay Raja, VP of Product, Gurucul Dwell time, or the length of time a cyber attacker remains hidden within an organization’s environment, is a major threat plaguing Security Operations […] The post Why Dwell Time is the Biggest Threat…
A Look into The Future: My Journey at the 2023 RSA Conference and The Exciting, Yet Troubling Path of Cybersecurity Innovation
Exploring the Future of Cybersecurity at the 2023 RSA Conference By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine As the recipient of Cyber Defense Magazine’s 2023 Young Women in […] The post A Look into The Future: My Journey…
The Next Evolution of Devsecops For The Defense Department
By Jonas Lazo, Vice President of Digital Engineering, Sev1Tech The White House recently proposed an $842 billion budget for the Department of Defense (DOD) for 2024, emphasizing the Administration’s commitment […] The post The Next Evolution of Devsecops For The…
An Interview with Sarah Armstrong-Smith
By Megan Lupton, Senior Content Executive, Champions Speakers Sarah Armstrong-Smith is a globally revered voice in the cyberspace. She is regularly booked for corporate conference and as a Cyber Security […] The post An Interview with Sarah Armstrong-Smith appeared first…
Three Things Corporate Board Members Need to Know to Protect Their Companies From Cyberattacks
By Sami Mäkiniemelä, Chief Security Officer, Miradore Last year, the U.S. saw a 57% increase in the number of cyberattacks — that’s nearly double the 38% increase that was reported […] The post Three Things Corporate Board Members Need to…
Securing Communications for Operational Military Success
By Nicole Allen, Senior Marketing Executive at Salt Communications. The significance in having Secure Communications for Military Operations. Thanks to expertly planned operational communications, military duties can be carried out […] The post Securing Communications for Operational Military Success appeared…
Operationalizing Zero Trust Architecture
By Chaim Mazal, Chief Security Officer, Gigamon Over the last few years, organizations have been hearing about a Zero Trust architecture (ZTA) as a means for IT leaders to take a […] The post Operationalizing Zero Trust Architecture appeared first on…
Phishing Kit: New Frontier of Hacker Attacks within Everyone’s Reach
By Lorenzo Asuni, CMO, Ermes Cyber Security The Phishing phenomenon is growing exponentially, and unlike the most common forms of scam, it is much more dangerous, because it is more […] The post Phishing Kit: New Frontier of Hacker Attacks…
Oh, Great and Powerful Cloud, I Wish to Be Free Of The Burdens Of Infrastructure!
By Craig Burland, CISO, Inversion6 The Cloud’s booming voice, stunning light show and smoke fill the room. “Faster! More agile! Cheaper! Business aligned! Strategic! I have the answer to all […] The post Oh, Great and Powerful Cloud, I Wish…
How Should CMMC Impact Your Remote Work Policies?
By Zac Amos, Features Editor, ReHack Cybersecurity Maturity Model Certification (CMMC) is another compliance framework defense industrial base (DIB) contractors can add to their toolkits to work for the Department […] The post How Should CMMC Impact Your Remote Work…
How Professional Human Hackers Choose Their Targets
By Peter Warmka, Founder, Counterintelligence Institute Over the past few years, Cybersecurity professionals have acknowledged the increasing need of security awareness training to combat the growing threat from social engineering. […] The post How Professional Human Hackers Choose Their Targets…
How Sandboxes Protect Organizations from Malware — Known And Unknown
From Detecting Threats to Collecting Rich Signature Data — Sandboxes Help Malware Researchers Keep Defense Systems In Sync With An Evolving Threat Landscape. By Jack Zalesskiy, Technology Writer, ANY.RUN Over […] The post How Sandboxes Protect Organizations from Malware —…
Hacks And Data Leaks
How to protect businesses from cyberattacks By Sergey Ozhegov, CEO, SearchInform Hacks and data leaks: how to protect businesses from cyberattacks Hardly a week goes by without a hack or […] The post Hacks And Data Leaks appeared first on…
An Interview with Greg Van Der Gaast
By Megan Lupton, Senior Content Executive, Champions Speakers From one of the most wanted hackers to being featured in the Top Trending Ethical Hackers list, Greg van der Gaast has […] The post An Interview with Greg Van Der Gaast…
What are NIST Encryption Standards? Why Do They Matter a Lot?
By Amar Basic, Co-Founder CyberArrow Data encryption is essential in today’s technologically advanced world to safeguard sensitive information against hacker assaults and data breaches, as an estimated 30,000 websites are […] The post What are NIST Encryption Standards? Why Do…
Empowered Encryption
Why organizations must take back control of their data By Dimitri Nemirovsky, Co-Founder & COO, Atakama Sometimes, what a change represents is more meaningful than the change itself. Case in […] The post Empowered Encryption appeared first on Cyber Defense…
Most Commonly Overlooked Attack Surface Vulnerabilities & How to Fix Them
By Marc Laliberte, Director of Security Operations at WatchGuard Over the last decade, many organizations have rapidly accelerated their digital transformation. The rise in cloud hosted Software-as-a-Service (SaaS) applications, continued […] The post Most Commonly Overlooked Attack Surface Vulnerabilities &…
Investing Wisely
Where to focus spend during the economic downturn By Tim Wallen, Regional Director, UK, US & Emerging Markets, Logpoint There remains a great deal of uncertainty when it comes to […] The post Investing Wisely appeared first on Cyber Defense…
Online Privacy Statistics
By Milos Djordjevic, Online Privacy Expert, VPN Central Online privacy is a burning issue in our modern threat landscape. It concerns both companies and individuals — no one can afford […] The post Online Privacy Statistics appeared first on Cyber…
Before You Deploy Advanced Tech, Consider the Hidden Cyberthreats
By Jennifer Varner, Director Security Solutions Sales – North America, Verizon Business Every year, emerging technologies come to market, offering new opportunities to connect with employees and customers in previously […] The post Before You Deploy Advanced Tech, Consider the…
From AI-driven Defense to Dark Web Threat Intelligence
How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […] The post From AI-driven Defense to Dark Web Threat…
Protecting Sensitive Information Within Translation
Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO, Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as financial […] The post Protecting Sensitive Information Within Translation appeared first…
How Secure Communication Can Enhance Your Organization’s Cyber Defence
By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due to an exponential increase of interconnected devices, systems, infrastructures inside […] The post How Secure Communication Can Enhance Your Organization’s…
The 2023 State of Ransomware: A Resurgence Is Brewing
By Bob Maley, CSO at Black Kite After last year’s good fight against ransomware gangs, CISOs thought they won. Overall attacks were down and ransom payments dropped 40%. In fact, […] The post The 2023 State of Ransomware: A Resurgence…
Do Highly Intelligent Language Models Pose a Cyber Threat?
By Brett Raybould, EMEA Solutions Architect, Menlo Security It is estimated that as many as 100 million users have engaged with AI chatbot, ChatGPT, since it was released at the […] The post Do Highly Intelligent Language Models Pose a…
Now is the Time for the Thoughtful Regulation of Crypto
By Hugh Brooks, Director of Security Operations, CertiK The rapid expansion of the cryptocurrency industry has brought technological innovation and financial inclusion, while promising a freer and fairer global financial […] The post Now is the Time for the Thoughtful…
A Look At The Damages Covered By Corporate Cyber Insurance
By Taylor McKnight, Digital Marketing PR Specialist, Tivly Consider cyber liability insurance to protect your business from a data breach or cyber-attack. This type of insurance covers the costs associated […] The post A Look At The Damages Covered By…
Navigating Your Way to Resiliency in Four Steps
By Shane Steiger, Principal Cybersecurity Engineer, MITRE Cyber resiliency. The concept has been around for many years. No doubt you’ve seen the images, such as a tiny flower emerging among […] The post Navigating Your Way to Resiliency in Four…
5 Benefits Of SIEM To The Cybersecurity Of Any Business
By Aaron Haynes, a Columnist at Loganix.com Cybersecurity is a top priority for many businesses today because of the significant threats they face from hackers and cybercriminals. Companies now deal […] The post 5 Benefits Of SIEM To The Cybersecurity…
Going On the Defensive: Turning the Tide on The Cybersecurity Vulnerabilities Of Smart Home Devices With Value-Added Services
By Craig Thole, SVP, Product Development and Operations at Assurant, Inc. While the rise of internet-enabled smart home devices generates the opportunity to create an advanced, intuitive smart home ecosystem, […] The post Going On the Defensive: Turning the Tide…
Communicating Cyber Risk
CISOs struggle with the board amidst an economic downturn. By Tim Fleming, Strategic Advisor, Silverfort Cyber risk is now nailed firmly to the board table. A seemingly never-ending procession of […] The post Communicating Cyber Risk appeared first on Cyber…
Is ChatGPT Ready to Disrupt Cybersecurity?
By Anurag Gurtu, Co-Founder & CPO, StrikeReady We’ve seen so many advancements in artificial intelligence within just a few years. ChatGPT is definitely one of the most recent ones – […] The post Is ChatGPT Ready to Disrupt Cybersecurity? appeared…
Preparing Travel and Hospitality Companies for Cybersecurity in The Wake Of Travel Technologies
By Shambhu Nath Jha, Associate Vice President, Fact.MR Technology has touched every aspect of our lives and became an integral part of them. This has further changed the way we […] The post Preparing Travel and Hospitality Companies for Cybersecurity…
Cyber Risk Quantification: A New Way to Understand Security Risks
CRQ can identify security improvements, prioritize implementation and justify security investments. Here’s how to make it work for your organization. By Bruno Farinelli, Senior Director of Operations and Analytics, ClearSale […] The post Cyber Risk Quantification: A New Way to…
Evolution of the CISO Role
By Jaye Tillson, Director of Strategy, Axis Security Evolution of the CISO Role The Chief Information Security Officer (CISO) role is relatively new in the corporate world, with its origins […] The post Evolution of the CISO Role appeared first…
Why It Will Take Sophisticated AI Solutions to Fight AI Security Attacks
By Rom Hendler, CEO and Co-Founder of Trustifi We live in amazing times, when advanced AI-based text generating engines like ChatGPT can scan the Internet for information and create an […] The post Why It Will Take Sophisticated AI Solutions…
1020 Cyber Security Professionals’ Actions and Experiences When Applying for A New Role.
By Torquil Macleod, Founder and Director of Via Resource At Via Resource, we strive to provide a supportive service to our candidates and clients. As the world shifts and everyone […] The post 1020 Cyber Security Professionals’ Actions and Experiences…
Closing The Cyber Marketing Gap with Investors
Positioning security as a stakeholder value proposition By Patrick Kehoe, Chief Marketing Officer at Coalfire With breaches and shutdowns making daily headlines, no one wants to do business anymore with […] The post Closing The Cyber Marketing Gap with Investors…
Stopping Criminals from Profiting Off Malware Requires a New Approach
By CW Walker, Director, Security Product Strategy at SpyCloud The first three quarters of 2022 saw the total detection of over 62.29 million new types of malware – approximately 228,000 new threats […] The post Stopping Criminals from Profiting Off Malware Requires…
The Data Dilemma: Balancing Business Growth and Security
By Noah Johnson, Co-Founder & CTO of Dasera In today’s digital age, data is the lifeblood of business growth. With large amounts of data sprawled across multiple platforms, companies must […] The post The Data Dilemma: Balancing Business Growth and…
Considering All Returns on a Cybersecurity Compliance Program
By Doug Barbin, Chief Growth Officer and Managing Principal at Schellman C-Suite executives have many variables to consider when they are implementing changes or making investments at an enterprise level. […] The post Considering All Returns on a Cybersecurity Compliance…
Secure Enterprise Collaboration Tools Are Critical in Light of Remote Work and Cyber-Attacks.
By Allen Drennan, Principal and Co-Founder of Cordoniq Cyberattacks escalated in 2022 as critical industries remain a frequent target of cybercriminals. New data from Check Point Research revealed that global […] The post Secure Enterprise Collaboration Tools Are Critical in…
Risk: Everything Everywhere All at Once
It’s Time to Get Proactive About Risk Reduction By Marc Gaffan, CEO of IONIX The first quarter of 2023 is being dominated by a singular theme, re-thinking risk. We came […] The post Risk: Everything Everywhere All at Once appeared…
Reduce Healthcare Insider Threats with Identity and Access Management
By Zac Amos, Features Editor of ReHack Identity and access management (IAM) refers to the policies, procedures and technologies used to manage and control access to digital resources and systems. […] The post Reduce Healthcare Insider Threats with Identity and…
Ransomware Takes No Prisoners
By Monica Oravcova, COO and Co-Founder of Naoris Protocol The recent Killnet cyberattack that disrupted contact between NATO and military aircraft providing aid to victims of the Turkish-Syrian earthquake, is […] The post Ransomware Takes No Prisoners appeared first on…
Leadership Is Still Washing Their Hands of Cyber Risk
By John A. Smith, CEO of Conversant Group Where it comes to owning responsibility for cyber risk, executive leadership has moved in and out of the spotlight like character actors […] The post Leadership Is Still Washing Their Hands of…
Machine Identity Management: The Key to Managing Compliance Risk in a Multi-Cloud, Multi-Cluster World
By Sitaram Iyer, Senior Director of Cloud Native Solutions at Venafi Financial services may be an industry in which mainframes still do much of the heavy lifting, but increasingly it’s […] The post Machine Identity Management: The Key to Managing…
Protecting Accounting Firms from Cyberattacks
Cybersecurity Practices Must Be A Top Priority For Firms This Busy Season By Alan Hartwell, Chief Technology Officer at IRIS Software Group Financial service firms are a top target for […] The post Protecting Accounting Firms from Cyberattacks appeared first…
New Cyber Threats Calls for New Approaches
By Mark Sincevich, Federal Director of Illumio Data compromises hit record numbers in 2021 with 1,826 occurrences reported, up 23 percent from 2017. In the last two years alone, 66 […] The post New Cyber Threats Calls for New Approaches…
How Must IT Leaders Develop Contingency Plans to Combat Geopolitical and Environmental Risks?
By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights In today’s geostrategic context, geopolitics and technology are inextricably linked, but many IT professionals who prioritize digital transformation pay comparably […] The post How Must IT Leaders Develop Contingency Plans…
How the Increasing IT Talent Gap is Impacting the Cybersecurity Industry
By Pete Sorensen, VP of Strategic Initiatives of ConnectWise In the rapidly evolving digital landscape, technology solution providers (TSPs) are having to deal with an unprecedented number of staff vacancies […] The post How the Increasing IT Talent Gap is…
Stop Backing Up Ransomware
By James Gorman, Cyber Security Expert and Entrepreneur When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for the cloud environment. However, having […] The post Stop Backing Up Ransomware appeared first on…
Understanding The Concept of Privacy By Design
By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and Privacy Commissioner Ann Cavoukian, is a comprehensive approach to privacy […] The post Understanding The Concept of Privacy By Design…
The Data Challenge: How to Map Data in A Distributed World
By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies Here’s a quick-fire question: do you know where all your sensitive data is? As businesses of all sizes […] The post The Data Challenge: How to Map Data…
Cyberattacks on City and Municipal Governments
Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago. The increase in breaches is likely due to several factors, including the […] The post Cyberattacks on City and Municipal Governments appeared…
Cyber Attack as an Asymmetric Threat
By Milica D. Djekic, Independent Researcher Abstract: Cyberspace is yet unsafe environment for communication and data transfer. Hacker’s organizations can target many servers, datacenters and endpoints relying on capacities of […] The post Cyber Attack as an Asymmetric Threat appeared…
HIPAA-HITECH: Keeping the Compliance Engine Running on a Classic Data Protection Regulation
By Gregory Hoffer, CEO, Coviant Software Everyone knows someone who is a vintage car nut. They keep their baby in the garage during inclement weather and roll it out on […] The post HIPAA-HITECH: Keeping the Compliance Engine Running on…
SIEM for SAP – Log Evaluation to Attack Detection
By Christoph Nagy, CEO of SecurityBridge To detect attacks on SAP, you need to evaluate the security logs in SAP. While many organizations have spent the past few years protecting […] The post SIEM for SAP – Log Evaluation to…
The Cybercrime Blame Game: It’s Time to Unite the Industry Against a Common Enemy.
The need for the cybersecurity industry to work together in order to combat the rising threat of cybercrime. By Brendan Kotze, Chief Executive Officer at Encore When someone breaks into […] The post The Cybercrime Blame Game: It’s Time to…
Collaboration is Key to Building Industrial Cyber Resilience
By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis Specialist at the World Economic Forum`s Centre for Cybersecurity Industries […] The post Collaboration is Key to Building Industrial Cyber…
SAP Debugger’s Power and Danger
By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar where the Service Advertising Protocol (“SAP”) representative explained a recently […] The post SAP Debugger’s Power and Danger appeared first…
Blockchain Startups Are Drawing Substantial Venture Capital Funding
By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights Blockchain technology is becoming more popular owing to the various benefits businesses get from it- supply chain management, decentralized finance, […] The post Blockchain Startups Are Drawing Substantial Venture Capital…
A CEO’s Guide to Not Becoming the Next Cyberattack Headline
By Sheetal Pansare, President & Global CEO of Futurism Technologies Imagine you are a CEO waking up to a Class-action lawsuit simply because your IT department failed to comply with […] The post A CEO’s Guide to Not Becoming the…
Advancements in AI Cybersecurity: Leveraging ChatGPT to Stay Ahead of Cyber Criminals
By Brian Sathianathan, Co-Founder and CTO of Iterate.ai As our world becomes more and more digitized, the threat of cyber-attacks has become increasingly prevalent. The need for strong cybersecurity measures […] The post Advancements in AI Cybersecurity: Leveraging ChatGPT to…
Strengths and Vulnerabilities of AI Applications to Health Care
By Edward Maule, Chief Information Officer and Chief Information Security Officer at Advocare, LLC Artificial intelligence (AI) has made significant advancements in the healthcare sector, and its potential is almost […] The post Strengths and Vulnerabilities of AI Applications to…
2023 Predictions
By Anurag Gurtu, Chief Product Officer at Strike Ready In 2022, the global average total breach cost surpassed $4.35M, and nearly two-thirds of organizations experienced more than one breach. As […] The post 2023 Predictions appeared first on Cyber Defense…
Mastering Patch Management: 10 Essential Best Practices for Optimal Security
What is patch management and why is it important? Software development is a continuous process, whether it involves creating a Windows Server or a simple text editor. Vendors release functional […] The post Mastering Patch Management: 10 Essential Best Practices…
ChatGPT and You
Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer at Sangfor Technologies Okay, I admit the title is clickbait to get you to read this article. […] The post ChatGPT and You appeared first on Cyber…
How To Survive a Ransomware Attack and Fix Ransomware Breach Face
By Derek Nugent, Vice President of Revenue at Difenda Ransomware attacks have become a growing concern for businesses and individuals alike. Each year there are over 236.1 million ransomware attacks […] The post How To Survive a Ransomware Attack and…
Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework
By Kaustubh Medhe, Head of Research and Intelligence at Cyble Cybercriminal motivations rarely change over time. A typical cyberattack is carried out for one of the following reasons – Illicit […] The post Making a Business Case for Cyber Threat…
Security Tool Integration Isn’t Enough Anymore
By Manoj Arora, Founder & CEO, Difenda Organizations today are overwhelmed with options when it comes to security tools and technologies. In the past, best-of-breed security technology meant having the […] The post Security Tool Integration Isn’t Enough Anymore appeared…
Going into the Darknet: How Cynet Lighthouse Services Keep Cybersecurity Teams One Step Ahead of Hackers
By monitoring the darknet, as well as underground forums, Cynet is able to identify and prepare for the latest cybersecurity threats before they reach deafening levels. By Eyal Gruner, Co-Founder […] The post Going into the Darknet: How Cynet Lighthouse…
Enhance Employee Productivity by Adopting a Modern Approach to Password Security
By Joshua Parsons, Product Marketing Manager at Enzoic For decades, enterprise security measures and employee productivity were seemingly at odds. In fact, 37% of respondents in a recent Vanson Bourne […] The post Enhance Employee Productivity by Adopting a Modern…
Complexity is Still the Enemy of Security
Ease of Use, Ease of Integration Encourages Data Protection By Gregory Hoffer, CEO of Coviant Software In 1999 noted cybersecurity expert Bruce Schneier wrote in his Schneier on Security blog […] The post Complexity is Still the Enemy of Security…
Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change.
By Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing their intended job, giving a false sense of security, and causing […] The post Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches…
How to Improve your Security Posture and ROI
By Mark Evans, VP Marketing and Packet Capture Evangelist at Endace Let’s assume your security team has completed all the “low-hanging fruit” security essentials. They’ve made sure all the basic […] The post How to Improve your Security Posture and…
Security Leaders Are Finally Getting a Seat at The Table with Corporate Leadership – Make Good Use of Your Time There.
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security leaders mature their programs. By Robert Herjavec, CEO of Cyderes […] The post Security Leaders Are Finally Getting a Seat…
Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change
by Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing its intended job, giving a false sense of security, and causing […] The post Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches…
ImmuniWeb AI Platform
Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […] The post ImmuniWeb AI Platform appeared first on Cyber…
OT Zero Trust
The Last Frontier to Protect OT Environments By Terence Liu, CEO, TXOne Networks OT Zero Trust – a Device-Centric Methodology In the IT world, the heart of Zero Trust is […] The post OT Zero Trust appeared first on Cyber…
It’s 2023 – You MUST Know The SaaS Applications Your Employees Are Using
Organizations should have free access to their SaaS attack layer By Galit Lubetzky Sharon, Co-Founder & CTO, Wing Security While security budgets were not the first to be impacted by […] The post It’s 2023 – You MUST Know The…
How to Protect Your Ecommerce Site from Cybersecurity Threats
By Karl Pulanco, Product Portfolio Manager, Yondu Modern businesses no longer need a physical store to sell goods and services. All they need now is an eCommerce website to start […] The post How to Protect Your Ecommerce Site from…
2023: What Awaits Us?
By Ashley Stephenson, CTO, Corero Network Security When it comes to cyber security, one thing that 2022 and just about any recent year will be remembered for is the succession […] The post 2023: What Awaits Us? appeared first on…
ChatGPT and You
Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer, Sangfor Technologies Okay, I admit the title is clickbait to get you to read this article. There […] The post ChatGPT and You appeared first on Cyber…
Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
By Tyler Farrar, CISO, Exabeam According to the Exabeam State of the SIEM survey, security professionals remain confident in the face of modernizing adversaries despite rising breach numbers. The survey […] The post Organizations Have Security Priorities Mismatched as Breaches…
The Practical Side of ZTNA: How it Helps Harden Defenses
By Timothy Liu, CTO and co-founder, Hillstone Networks In the cybersecurity world, buzzwords seem proliferate with the changing of the wind. Currently zero-trust network access, or ZTNA, is getting its […] The post The Practical Side of ZTNA: How it…
Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework
By Kaustubh Medhe, Head of Research and Intelligence A recent market survey report (Source: Fortune Business Insights, March 2023) pegged the current market size of the Cyber Threat Intelligence (CTI) […] The post Making a Business Case for Cyber Threat…
Cloud Visibility and Port Spoofing: the “Known Unknown”
By Stephen Goudreault, Cloud Security Evangelist, Gigamon As with all technology, new tools are iterations built on what came before and classic network logging and metrics are no different. The […] The post Cloud Visibility and Port Spoofing: the “Known…
A Question of Doubt
The cyber security crisis of confidence amongst CISOs and CIOs — and how to overcome it. By Gary Penolver, Chief Technology Officer at Quod Orbis I’ve worked closely with CISOs […] The post A Question of Doubt appeared first on…
Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.
By Dan Richings – Senior Vice President, Global Presales, Solutions Engineering, and Support – Adaptiva Using third-party software is unavoidable in today’s market. The competition and the break-neck pace that […] The post Treading Water: The Struggle Against Third-Party Vulnerabilities…
Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security leaders mature their program By Robert Herjavec, CEO, Cyderes The […] The post Security leaders are finally getting a seat…
As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security
By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to determine how adversaries’ strategies are changing from month to month […] The post As Cyber Attacks Target Large Corporates, Teams…
Eight Tips for CISOs Trying Get Their Board on Board
By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role in strategic decision-making in enterprises. Yet CISOs frequently find themselves […] The post Eight Tips for CISOs Trying Get Their…
Next Generation Cybersecurity for Small to Midsize Businesses
How Cynet is giving lean security teams the tools they need to protect their business as budget crunches and reduced headcounts put many companies at risk by By Eyal Gruner, […] The post Next Generation Cybersecurity for Small to Midsize…
Zero Trust in a DevOps World
By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical to securing people, devices, infrastructure, and applications – all of […] The post Zero Trust in a DevOps World appeared…
Why Tackling Financial Crime Calls for A Privacy-First Approach
By Dr. Alon Kaufman, CEO and Co-Founder of Duality Technologies To gain the upper hand in the fight against financial crime, banks and other financial institutions need to share data, […] The post Why Tackling Financial Crime Calls for A…