By Gary Sockrider, Director, Security Solutions, NETSCOUT The rapid expansion of Internet of Things (IoT) devices, which now number in the billions, not to mention upgrades to network infrastructure and […] The post Adaptive DDoS Attacks Get More Sophisticated: How…
Category: Cyber Defense Magazine
Blockchain Technology: Strengthening Cybersecurity and Protecting Against Password Leaks and Data Breaches
By Thomas Carter, CEO, True I/O In today’s digital landscape, the frequency and severity of password leaks and data breaches have reached unprecedented levels. These incidents pose significant financial and […] The post Blockchain Technology: Strengthening Cybersecurity and Protecting Against…
Bridging the Widening Gap in Cybersecurity Talent: Addressing the Urgent Need for Skilled Professionals
By Travis Doe, Marketing Executive, Secure IT Consult Introduction In today’s digital age, where technology is deeply integrated into our personal and professional lives, the importance of cybersecurity cannot be […] The post Bridging the Widening Gap in Cybersecurity Talent:…
Publisher’s Spotlight: F5: Multi-Cloud Security and Application Delivery
F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations […] The post Publisher’s Spotlight: F5: Multi-Cloud Security and Application…
Boost Your Business Security: How Cyber Insurance Shields You from Cyber Threats
By Simon Pascoe, Director, FD Beck Insurance Brokers As the digital landscape evolves, cyber threats have become a significant concern for all businesses. Protecting your business from these risks is […] The post Boost Your Business Security: How Cyber Insurance…
Has MFA Had Its Day?
By Ori Arbel, CTO, CYREBRO Multi-factor authentication (MFA) has become the authentication standard for nearly all types of businesses – from banks to bicycle rentals and everything in between. Yet, […] The post Has MFA Had Its Day? appeared first…
From AI-driven Defense to Dark Web Threat Intelligence
How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […] The post From AI-driven Defense to Dark Web Threat…
Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio
When it comes to cybersecurity, the landscape is full of single-solution providers, making it easy for unexpected cyberthreats to sneak through the cracks. Fortra is creating a stronger, simpler strategy […] The post Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio appeared…
Cyber: Dealing with a Data Breach
Data breaches are one of the most significant cyber threats organizations face, but when they occur, many businesses do not respond in a manner that reassures their clients or the […] The post Cyber: Dealing with a Data Breach appeared…
AI In Cybersecurity – Risks and Rewards
By Aimei Wei, Co-Founder and CTO, Stellar Cyber The global cybersecurity workforce grew to a record 4.7 million people in 2022, according to an (ISC)2 2022 workforce study, but the same […] The post AI In Cybersecurity – Risks and Rewards…
Publisher’s Spotlight: IANS: Providing Expert Guidance to CISOs and their Teams
IANS Research has been working for the last two decades to create a way for InfoSec practitioners to collaborate in ways that are often difficult in other settings. The IANS […] The post Publisher’s Spotlight: IANS: Providing Expert Guidance to…
The Best of Both Worlds Made Possible with A Hybrid SOC
By Chase Richardson, Principal Lead Consultant, Bridewell The revolving door of cyber-attacks on major organizations continues to turn. Among the most significant of breaches over the last year was a […] The post The Best of Both Worlds Made Possible…
The Role of AI in Cybersecurity
By Alysia Silberg, CEO, Street Global As technology increasingly connects us, people, businesses, and governments are more concerned with Cybersecurity than ever before. The development of Artificial Intelligence (AI) provides […] The post The Role of AI in Cybersecurity appeared…
Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance Program
RegScale is a Modern GRC platform, delivering a simplified, integrated and scalable solution to meet the speed and real-time demands of the digital enterprise. The current manual and document-based approach […] The post Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance…
Publisher’s Spotlight: Security Journey: Secure Coding Training
Security Journey is a secure coding education provider that is focused on addressing the evolving landscape of cybersecurity threats with comprehensive and engaging training. As security awareness has become a […] The post Publisher’s Spotlight: Security Journey: Secure Coding Training…
Zero Trust Security: Pioneering Solutions on a ‘Never Trust, Always Verify’ Principle to Overcome Modern Cyberspace Security Challenges!
By Mohit Shrivastava, Chief Analyst ICT, Future Market Insights Zero trust security is a method of cybersecurity that undertakes that no user or device can be reliable, whether outside or […] The post Zero Trust Security: Pioneering Solutions on a…
Why Cybersecurity for Private Equity Is Urgent Now – And What Funds Can Do to Move the Needle.
Private equity fund-level technology leaders can play an impactful role in protecting their portfolio companies from cyber-attacks, from due diligence through exit By John Hauser, EY Americas Transaction Support – […] The post Why Cybersecurity for Private Equity Is Urgent…
Why CISOs Should Prioritize Cloud Security and Access Management During Digital Transformation Initiatives
By Ameya Khankar, Cybersecurity Consultant for Critical Infrastructure Companies undergoing digital transformation have decided to take the plunge into modernizing their core product offerings. It can be an arduous process, […] The post Why CISOs Should Prioritize Cloud Security and…
The Intersection of OT and IT: Why Unified Cybersecurity is More Important than Ever.
By Craig Burland, CISO, Inversion6 Computer-controlled devices are all around us. From delivery robots to smart buildings to shipping and transportation, computer-controlled devices that affect the physical – not digital […] The post The Intersection of OT and IT: Why…
Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model
Arctic Wolf is a global leader in security operations, enabling customers to manage their cyber risk in the face of modern cyberattacks. Our Arctic Wolf Security Operations Cloud ingests and […] The post Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud…
Publisher’s Spotlight: Normalyze: Data Security for Everything You Build and Run in The Cloud
Normalyze is a pioneering provider of data-first cloud security solutions that help global enterprises secure their data wherever it is stored and prevent data breaches. The Normalyze platform uses patented, […] The post Publisher’s Spotlight: Normalyze: Data Security for Everything…
Publisher’s Spotlight: Cycode: Secure Code to Cloud – Application Security Posture Management (ASPM) at Scale
Cycode’s modern approach to application security enables organizations to effectively secure their cloud-native applications with cost-efficient use of tooling and staff across the SDLC. The Cycode platform makes AppSec tools better […] The post Publisher’s Spotlight: Cycode: Secure Code to Cloud…
Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection
CrowdSec is a modern, collaborative cybersecurity company committed to proactively safeguarding digital assets. With a growing community of 65,000+ active installations contributing to a robust, constantly-updated global IP reputation database […] The post Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection…
The Other Russian War – What Can We Do?
Russian hacking efforts have highlighted weaknesses in U.S. cybersecurity infrastructure. By Jamie Eiseman, George Washington University Russia is invading Ukraine, and Russian hackers are attacking the United States. In October, […] The post The Other Russian War – What Can…
Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter
Today’s cyber attackers are looking beyond network systems and devices to target organizations through digital platforms outside your perimeter. It’s time to detect, expose, and disrupt these external threats to […] The post Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your…
The Billion Dollar Problem: Securing Business Communication in the Financial Sector
By Anurag Lal, President and CEO of NetSfere Securing business communication in the financial services industry is now more than ever a bottom-line issue. That’s because unsecure business communication creates […] The post The Billion Dollar Problem: Securing Business Communication…
The Industrial Control Systems and The Internet of Things
By Milica D. Djekic The industrial control systems (ICS) are usually the part of critical infrastructure to every country or nation. These systems have passed through information era and today […] The post The Industrial Control Systems and The Internet…
A Cloud Security Conundrum: Protecting Your Company from Third-Party Software Supply Chain Gaps
By Vrinda Khurjekar, Senior Director, AMER business, Searce The sky is the limit for cloud migration as Gartner predicts that worldwide end-user spending on public cloud services is forecast to […] The post A Cloud Security Conundrum: Protecting Your Company…
Publisher’s Spotlight: Mitiga: The Next Generation of Cloud Incident Response
Cloud and SaaS have become the new nexus for today’s cyber attackers. Are you ready to respond to a breach? Enter Mitiga: Mitiga is the creator of the world’s first […] The post Publisher’s Spotlight: Mitiga: The Next Generation of…
Publisher’s Spotlight: Cigent: Make Your Data Invisible
Cigent Technologies is a data security company that is renowned for their data protection capabilities. They’ve had a long-standing relationship with the U.S. government and have been a trusted resource […] The post Publisher’s Spotlight: Cigent: Make Your Data Invisible…
SaaS Application Security: Why It Matters and How to Get It Right
Protecting Emerging Startups from Advanced Cyber Threats with Proactive Security Measures By Babar Khan Akhunzada, Founder, SecurityWall Startups are known for their agility, speed, and innovation. They often disrupt entire […] The post SaaS Application Security: Why It Matters and…
Our Risk Perception Is Broken How Do We Fix It?
By Miguel Clarke, GRC and Cybersecurity Lead at Armor and former FBI Special Agent I was first introduced to the concept of cyber security in 2000. Back then, the Dallas […] The post Our Risk Perception Is Broken How Do…
Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries
Oligo Security is one of the leading open source cybersecurity platforms, pioneering the next wave of application security with a runtime solution that is proactive, effective, and frictionless. Oligo found […] The post Publisher’s Spotlight: Oligo: Protect Your Open Source…
Protecting Sensitive Information Within Translation
Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO of Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as […] The post Protecting Sensitive Information Within Translation appeared first…
An Interview with Dasha Deckwerth – Stealth ISS Group
The post An Interview with Dasha Deckwerth – Stealth ISS Group appeared first on Cyber Defense Magazine. This article has been indexed from Cyber Defense Magazine Read the original article: An Interview with Dasha Deckwerth – Stealth ISS Group
Penetration Testing- Shielding the Web Content Against Hacking
Penetration Testing Market size worth over $5.5 Bn by 2031 By Aashi Mishra, Sr. Content Writer, Research Nester In January 2023, a news surfaced the internet that 235 million twitter […] The post Penetration Testing- Shielding the Web Content Against…
Out from the Shadows: SOC Teams Take Their Seat with the “Superheroes”
By Karthik Kannan, Founder and CEO, Anvilogic Watch any superhero movie and it follows the same playbook: the story revolves around the superhero, at the midpoint of the movie there […] The post Out from the Shadows: SOC Teams Take…
Publisher’s Spotlight: Black Hat USA 2023 Closes on Record-Breaking Event in Las Vegas
Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, today announced the successful completion of the in-person component of Black Hat USA 2023. The event […] The post Publisher’s Spotlight: Black Hat USA 2023 Closes…
Network Architecture Mapping Improves Security Posture and Saves Big Bucks
By Matt Honea, Head of Security and Compliance, Forward Networks The challenge to adequately secure a large complex enterprise network, including the infrastructure and critical data assets, continues to plague […] The post Network Architecture Mapping Improves Security Posture and…
OT Under Greater Scrutiny in Global Cybersecurity Regulatory Environment
By Dr. Terence Liu, CEO, TXOne Networks Highly publicized cyberattacks have focused governments globally on re-examining and bolstering their cybersecurity regulations and policies, and it’s not just information technology (IT) […] The post OT Under Greater Scrutiny in Global Cybersecurity…
Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure
The post Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure appeared first on Cyber Defense Magazine. This article has been indexed from Cyber Defense Magazine Read the original article: Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure
Measuring the Effectivity of Security with Data Analysis
By Howie Robleza, Freelance Writer, Avigilon Effective security strategies are fundamental to the success of any business with both physical and cyber security of equal importance. Businesses, even with the […] The post Measuring the Effectivity of Security with Data…
Publisher’s Spotlight: The Zero Day Initiative (ZDI): Financially Rewarding InfoSec Researchers
Formed by TrendMicro, the Zero Day Initiative (ZDI) was created to encourage the reporting of 0-day vulnerabilities privately to the affected vendors by financially rewarding researchers. At the time, there […] The post Publisher’s Spotlight: The Zero Day Initiative (ZDI):…
Implement Machine Learning to Secure Your IoT Network
By Zac Amos, Features Editor, ReHack Connected devices pose unique security risks and are prone to bot attacks, requiring a tool capable of quickly processing a large amount of information. […] The post Implement Machine Learning to Secure Your IoT…
Hybrid Mesh Firewall Management
By Ulrica de Fort-Menares, VP of Product & Strategy, Indeni What is Hybrid Mesh Firewall? With the rise of hybrid workforces and cloud networks, there is growing demand to secure […] The post Hybrid Mesh Firewall Management appeared first on…
How We Grew Revenue by Strengthening Cybersecurity
Make your security strategy good for business. By David Weisong, CIO at Energy Solutions Utility companies are, like just about all industries, increasingly concerned about cybersecurity—and for good reason. A […] The post How We Grew Revenue by Strengthening Cybersecurity…
Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection
Did you know that only 4% of CISOs have real-time visibility into runtime vulnerabilities in containerized production environments (https://www.dynatrace.com/news/blog/runtime-vulnerability-management-still-vexing-organizations/)? According to Gartner, by 2025, over 75 percent of organizations will […] The post Publisher’s Spotlight: THREATX – A Cloud-Native Solution…
Five Tips to Securing Your Organization Through Your People.
By Dr. Inka Karppinen, CPsychol. Lead Behavioural Scientist, CybSafe While many commentators continue to tout technological solutions to various cyber security issues, with high-profile cyber-attacks and data breaches continuing to […] The post Five Tips to Securing Your Organization Through…
From Samsung to the Pentagon – Recent Stories Remind Us About the Importance of Sensitive Data Guardrails
By Thomas Segura, Cyber Security Expert, GitGuardian The last few weeks have been very challenging for data protection experts. In a very short period of time, several stories have dealt […] The post From Samsung to the Pentagon – Recent…
From Passwords to Passkeys – A Passing of the Torch
The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those without a password manager to keep track, that’s a prompt […] The post From Passwords to Passkeys – A Passing…
Ensuring Trust in Military Network Automation: Addressing Layer 8 Issues for Improved Operations and Security
By Marc Packler, President, CISO Advisory, Silent Quadrant and Tony Thomas, President & Chairman, Tony Thomas & Associates LLC Automation is becoming increasingly prevalent as technology continues to advance and […] The post Ensuring Trust in Military Network Automation: Addressing…
Embedding Privacy-First Behaviors for Future Generations
By Michael Levit, Co-Founder and CEO of Tempest As all of our lives have moved online, the collection and sharing of data by big tech and private companies has become […] The post Embedding Privacy-First Behaviors for Future Generations appeared…
Don’t Jump to Conclusions on Zero Trust Adoption
By John Linford, Forum Director, The Open Group Security Forum, and Open Trusted Technology Forum The Open Group Security & Open Trusted Technology (OTTF) Even in an industry known for […] The post Don’t Jump to Conclusions on Zero Trust…
How the SEC’s Proposed Security Rules Could Impact Businesses
By Portia Cole, Emergent Threat Researcher, Avertium If the Security and Exchange Commission (SEC) has its way, it will soon do more than any other federal agency has done when […] The post How the SEC’s Proposed Security Rules Could…
Controlling Cybersecurity Risks
Controlling Cyber Risks and Fraud by Risk Assessment By Hakan Kantas, Senior IT Director We are trying to protect all the Internet connected systems, users, network and other related structures […] The post Controlling Cybersecurity Risks appeared first on Cyber…
What Will Cybersecurity Jobs Look Like in 2028?
By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies What Will Cybersecurity Jobs Look Like in 2028? Macroeconomic turmoil, the Great Resignation, and layoffs by all-star companies – […] The post What Will Cybersecurity Jobs Look Like in…
One Defense Against Data Breaches: Don’t Have the Data to Begin With
By Raj Ananthanpillai, Founder and CEO, Trua When it comes to hackers stealing Social Security numbers and other personal identifiable information, even members of Congress aren’t safe. So why would […] The post One Defense Against Data Breaches: Don’t Have…
Heard At RSAC 2023 – Protecting the Protectors
Some Personal Risks to Individual Cybersecurity Practitioners Are Elevated Because Of The Work They Do. Is It Time for Workplace Cyber Protections to Follow Them Home? By Chris Needs, VP […] The post Heard At RSAC 2023 – Protecting the…
Why Cybersecurity Provision is Critical for Businesses, Large and Small
By Astrid Gobardhan, Group Data Protection Officer at VFS Global, the world’s largest outsourcing and technology services specialist Against a backdrop of biting inflation and uncertainty across global markets, many […] The post Why Cybersecurity Provision is Critical for Businesses,…
HEAT Attacks Vs Apts – What Is the Difference?
By Mark Guntrip, Senior Director of Cybersecurity Strategy, Menlo Security A new breed of attacker has emerged, one that has learned to weaponize the web browser. The Highly Evasive Adaptive Threats […] The post HEAT Attacks Vs Apts – What Is…
Bad Hygiene: New Study Uncovers Common Security Failures of Cloud-First Organizations
By Ruoting Sun, Vice President of Products, Secureframe The rapid rise of cloud-first organizations has revolutionized the way businesses operate. Yet with increased reliance on cloud services, information security is […] The post Bad Hygiene: New Study Uncovers Common Security…
7 Benefits of Implementing ZTNA
(Zero Trust Network Access) By Howie Robleza, Freelance Writer, Avigilon One of the most significant worries for business leaders in the current climate is the potential for an internal security […] The post 7 Benefits of Implementing ZTNA appeared first…
Biometric as a Service (BaaS) – An Opinion Piece
By Mohit Shrivastava, Chief Analyst ICT, Future Market Insights Biometric as a service (BaaS) works best as a striking alternative to other outmoded biometric software models. It becomes easy for […] The post Biometric as a Service (BaaS) – An…
Why Inadequate Investment in Cybersecurity is a False Economy
By Luke Dash, CEO, ISMS.online Already suffering the most cyberattacks than any other European country [RH1], the UK looks set to experience a proliferation of vulnerabilities as businesses struggle to […] The post Why Inadequate Investment in Cybersecurity is a…
The Power of AI In Today’s Rapidly Evolving Financial Crime Landscape
By Pedro Barata, Chief Product Officer, Feedzai Fraud has plagued the financial services sector for years. In today’s rapidly evolving digital landscape, financial institutions are under increasing pressure to safeguard […] The post The Power of AI In Today’s Rapidly…
Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023
By Sanjay Raja, VP of Product, Gurucul Dwell time, or the length of time a cyber attacker remains hidden within an organization’s environment, is a major threat plaguing Security Operations […] The post Why Dwell Time is the Biggest Threat…
A Look into The Future: My Journey at the 2023 RSA Conference and The Exciting, Yet Troubling Path of Cybersecurity Innovation
Exploring the Future of Cybersecurity at the 2023 RSA Conference By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine As the recipient of Cyber Defense Magazine’s 2023 Young Women in […] The post A Look into The Future: My Journey…
The Next Evolution of Devsecops For The Defense Department
By Jonas Lazo, Vice President of Digital Engineering, Sev1Tech The White House recently proposed an $842 billion budget for the Department of Defense (DOD) for 2024, emphasizing the Administration’s commitment […] The post The Next Evolution of Devsecops For The…
An Interview with Sarah Armstrong-Smith
By Megan Lupton, Senior Content Executive, Champions Speakers Sarah Armstrong-Smith is a globally revered voice in the cyberspace. She is regularly booked for corporate conference and as a Cyber Security […] The post An Interview with Sarah Armstrong-Smith appeared first…
Three Things Corporate Board Members Need to Know to Protect Their Companies From Cyberattacks
By Sami Mäkiniemelä, Chief Security Officer, Miradore Last year, the U.S. saw a 57% increase in the number of cyberattacks — that’s nearly double the 38% increase that was reported […] The post Three Things Corporate Board Members Need to…
Securing Communications for Operational Military Success
By Nicole Allen, Senior Marketing Executive at Salt Communications. The significance in having Secure Communications for Military Operations. Thanks to expertly planned operational communications, military duties can be carried out […] The post Securing Communications for Operational Military Success appeared…
Operationalizing Zero Trust Architecture
By Chaim Mazal, Chief Security Officer, Gigamon Over the last few years, organizations have been hearing about a Zero Trust architecture (ZTA) as a means for IT leaders to take a […] The post Operationalizing Zero Trust Architecture appeared first on…
Phishing Kit: New Frontier of Hacker Attacks within Everyone’s Reach
By Lorenzo Asuni, CMO, Ermes Cyber Security The Phishing phenomenon is growing exponentially, and unlike the most common forms of scam, it is much more dangerous, because it is more […] The post Phishing Kit: New Frontier of Hacker Attacks…
Oh, Great and Powerful Cloud, I Wish to Be Free Of The Burdens Of Infrastructure!
By Craig Burland, CISO, Inversion6 The Cloud’s booming voice, stunning light show and smoke fill the room. “Faster! More agile! Cheaper! Business aligned! Strategic! I have the answer to all […] The post Oh, Great and Powerful Cloud, I Wish…
How Should CMMC Impact Your Remote Work Policies?
By Zac Amos, Features Editor, ReHack Cybersecurity Maturity Model Certification (CMMC) is another compliance framework defense industrial base (DIB) contractors can add to their toolkits to work for the Department […] The post How Should CMMC Impact Your Remote Work…
How Professional Human Hackers Choose Their Targets
By Peter Warmka, Founder, Counterintelligence Institute Over the past few years, Cybersecurity professionals have acknowledged the increasing need of security awareness training to combat the growing threat from social engineering. […] The post How Professional Human Hackers Choose Their Targets…
How Sandboxes Protect Organizations from Malware — Known And Unknown
From Detecting Threats to Collecting Rich Signature Data — Sandboxes Help Malware Researchers Keep Defense Systems In Sync With An Evolving Threat Landscape. By Jack Zalesskiy, Technology Writer, ANY.RUN Over […] The post How Sandboxes Protect Organizations from Malware —…
Hacks And Data Leaks
How to protect businesses from cyberattacks By Sergey Ozhegov, CEO, SearchInform Hacks and data leaks: how to protect businesses from cyberattacks Hardly a week goes by without a hack or […] The post Hacks And Data Leaks appeared first on…
An Interview with Greg Van Der Gaast
By Megan Lupton, Senior Content Executive, Champions Speakers From one of the most wanted hackers to being featured in the Top Trending Ethical Hackers list, Greg van der Gaast has […] The post An Interview with Greg Van Der Gaast…
What are NIST Encryption Standards? Why Do They Matter a Lot?
By Amar Basic, Co-Founder CyberArrow Data encryption is essential in today’s technologically advanced world to safeguard sensitive information against hacker assaults and data breaches, as an estimated 30,000 websites are […] The post What are NIST Encryption Standards? Why Do…
Empowered Encryption
Why organizations must take back control of their data By Dimitri Nemirovsky, Co-Founder & COO, Atakama Sometimes, what a change represents is more meaningful than the change itself. Case in […] The post Empowered Encryption appeared first on Cyber Defense…
Most Commonly Overlooked Attack Surface Vulnerabilities & How to Fix Them
By Marc Laliberte, Director of Security Operations at WatchGuard Over the last decade, many organizations have rapidly accelerated their digital transformation. The rise in cloud hosted Software-as-a-Service (SaaS) applications, continued […] The post Most Commonly Overlooked Attack Surface Vulnerabilities &…
Investing Wisely
Where to focus spend during the economic downturn By Tim Wallen, Regional Director, UK, US & Emerging Markets, Logpoint There remains a great deal of uncertainty when it comes to […] The post Investing Wisely appeared first on Cyber Defense…
Online Privacy Statistics
By Milos Djordjevic, Online Privacy Expert, VPN Central Online privacy is a burning issue in our modern threat landscape. It concerns both companies and individuals — no one can afford […] The post Online Privacy Statistics appeared first on Cyber…
Before You Deploy Advanced Tech, Consider the Hidden Cyberthreats
By Jennifer Varner, Director Security Solutions Sales – North America, Verizon Business Every year, emerging technologies come to market, offering new opportunities to connect with employees and customers in previously […] The post Before You Deploy Advanced Tech, Consider the…
From AI-driven Defense to Dark Web Threat Intelligence
How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […] The post From AI-driven Defense to Dark Web Threat…
Protecting Sensitive Information Within Translation
Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO, Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as financial […] The post Protecting Sensitive Information Within Translation appeared first…
How Secure Communication Can Enhance Your Organization’s Cyber Defence
By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due to an exponential increase of interconnected devices, systems, infrastructures inside […] The post How Secure Communication Can Enhance Your Organization’s…
The 2023 State of Ransomware: A Resurgence Is Brewing
By Bob Maley, CSO at Black Kite After last year’s good fight against ransomware gangs, CISOs thought they won. Overall attacks were down and ransom payments dropped 40%. In fact, […] The post The 2023 State of Ransomware: A Resurgence…
Do Highly Intelligent Language Models Pose a Cyber Threat?
By Brett Raybould, EMEA Solutions Architect, Menlo Security It is estimated that as many as 100 million users have engaged with AI chatbot, ChatGPT, since it was released at the […] The post Do Highly Intelligent Language Models Pose a…
Now is the Time for the Thoughtful Regulation of Crypto
By Hugh Brooks, Director of Security Operations, CertiK The rapid expansion of the cryptocurrency industry has brought technological innovation and financial inclusion, while promising a freer and fairer global financial […] The post Now is the Time for the Thoughtful…
A Look At The Damages Covered By Corporate Cyber Insurance
By Taylor McKnight, Digital Marketing PR Specialist, Tivly Consider cyber liability insurance to protect your business from a data breach or cyber-attack. This type of insurance covers the costs associated […] The post A Look At The Damages Covered By…
Navigating Your Way to Resiliency in Four Steps
By Shane Steiger, Principal Cybersecurity Engineer, MITRE Cyber resiliency. The concept has been around for many years. No doubt you’ve seen the images, such as a tiny flower emerging among […] The post Navigating Your Way to Resiliency in Four…
5 Benefits Of SIEM To The Cybersecurity Of Any Business
By Aaron Haynes, a Columnist at Loganix.com Cybersecurity is a top priority for many businesses today because of the significant threats they face from hackers and cybercriminals. Companies now deal […] The post 5 Benefits Of SIEM To The Cybersecurity…
Going On the Defensive: Turning the Tide on The Cybersecurity Vulnerabilities Of Smart Home Devices With Value-Added Services
By Craig Thole, SVP, Product Development and Operations at Assurant, Inc. While the rise of internet-enabled smart home devices generates the opportunity to create an advanced, intuitive smart home ecosystem, […] The post Going On the Defensive: Turning the Tide…
Communicating Cyber Risk
CISOs struggle with the board amidst an economic downturn. By Tim Fleming, Strategic Advisor, Silverfort Cyber risk is now nailed firmly to the board table. A seemingly never-ending procession of […] The post Communicating Cyber Risk appeared first on Cyber…
Is ChatGPT Ready to Disrupt Cybersecurity?
By Anurag Gurtu, Co-Founder & CPO, StrikeReady We’ve seen so many advancements in artificial intelligence within just a few years. ChatGPT is definitely one of the most recent ones – […] The post Is ChatGPT Ready to Disrupt Cybersecurity? appeared…
Preparing Travel and Hospitality Companies for Cybersecurity in The Wake Of Travel Technologies
By Shambhu Nath Jha, Associate Vice President, Fact.MR Technology has touched every aspect of our lives and became an integral part of them. This has further changed the way we […] The post Preparing Travel and Hospitality Companies for Cybersecurity…
Cyber Risk Quantification: A New Way to Understand Security Risks
CRQ can identify security improvements, prioritize implementation and justify security investments. Here’s how to make it work for your organization. By Bruno Farinelli, Senior Director of Operations and Analytics, ClearSale […] The post Cyber Risk Quantification: A New Way to…
Evolution of the CISO Role
By Jaye Tillson, Director of Strategy, Axis Security Evolution of the CISO Role The Chief Information Security Officer (CISO) role is relatively new in the corporate world, with its origins […] The post Evolution of the CISO Role appeared first…