Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security leaders mature their programs. By Robert Herjavec, CEO of Cyderes […] The post Security Leaders Are Finally Getting a Seat…
Category: Cyber Defense Magazine
Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change
by Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing its intended job, giving a false sense of security, and causing […] The post Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches…
ImmuniWeb AI Platform
Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […] The post ImmuniWeb AI Platform appeared first on Cyber…
OT Zero Trust
The Last Frontier to Protect OT Environments By Terence Liu, CEO, TXOne Networks OT Zero Trust – a Device-Centric Methodology In the IT world, the heart of Zero Trust is […] The post OT Zero Trust appeared first on Cyber…
It’s 2023 – You MUST Know The SaaS Applications Your Employees Are Using
Organizations should have free access to their SaaS attack layer By Galit Lubetzky Sharon, Co-Founder & CTO, Wing Security While security budgets were not the first to be impacted by […] The post It’s 2023 – You MUST Know The…
How to Protect Your Ecommerce Site from Cybersecurity Threats
By Karl Pulanco, Product Portfolio Manager, Yondu Modern businesses no longer need a physical store to sell goods and services. All they need now is an eCommerce website to start […] The post How to Protect Your Ecommerce Site from…
2023: What Awaits Us?
By Ashley Stephenson, CTO, Corero Network Security When it comes to cyber security, one thing that 2022 and just about any recent year will be remembered for is the succession […] The post 2023: What Awaits Us? appeared first on…
ChatGPT and You
Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer, Sangfor Technologies Okay, I admit the title is clickbait to get you to read this article. There […] The post ChatGPT and You appeared first on Cyber…
Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
By Tyler Farrar, CISO, Exabeam According to the Exabeam State of the SIEM survey, security professionals remain confident in the face of modernizing adversaries despite rising breach numbers. The survey […] The post Organizations Have Security Priorities Mismatched as Breaches…
The Practical Side of ZTNA: How it Helps Harden Defenses
By Timothy Liu, CTO and co-founder, Hillstone Networks In the cybersecurity world, buzzwords seem proliferate with the changing of the wind. Currently zero-trust network access, or ZTNA, is getting its […] The post The Practical Side of ZTNA: How it…
Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework
By Kaustubh Medhe, Head of Research and Intelligence A recent market survey report (Source: Fortune Business Insights, March 2023) pegged the current market size of the Cyber Threat Intelligence (CTI) […] The post Making a Business Case for Cyber Threat…
Cloud Visibility and Port Spoofing: the “Known Unknown”
By Stephen Goudreault, Cloud Security Evangelist, Gigamon As with all technology, new tools are iterations built on what came before and classic network logging and metrics are no different. The […] The post Cloud Visibility and Port Spoofing: the “Known…
A Question of Doubt
The cyber security crisis of confidence amongst CISOs and CIOs — and how to overcome it. By Gary Penolver, Chief Technology Officer at Quod Orbis I’ve worked closely with CISOs […] The post A Question of Doubt appeared first on…
Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.
By Dan Richings – Senior Vice President, Global Presales, Solutions Engineering, and Support – Adaptiva Using third-party software is unavoidable in today’s market. The competition and the break-neck pace that […] The post Treading Water: The Struggle Against Third-Party Vulnerabilities…
Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security leaders mature their program By Robert Herjavec, CEO, Cyderes The […] The post Security leaders are finally getting a seat…
As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security
By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to determine how adversaries’ strategies are changing from month to month […] The post As Cyber Attacks Target Large Corporates, Teams…
Eight Tips for CISOs Trying Get Their Board on Board
By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role in strategic decision-making in enterprises. Yet CISOs frequently find themselves […] The post Eight Tips for CISOs Trying Get Their…
Next Generation Cybersecurity for Small to Midsize Businesses
How Cynet is giving lean security teams the tools they need to protect their business as budget crunches and reduced headcounts put many companies at risk by By Eyal Gruner, […] The post Next Generation Cybersecurity for Small to Midsize…
Zero Trust in a DevOps World
By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical to securing people, devices, infrastructure, and applications – all of […] The post Zero Trust in a DevOps World appeared…
Why Tackling Financial Crime Calls for A Privacy-First Approach
By Dr. Alon Kaufman, CEO and Co-Founder of Duality Technologies To gain the upper hand in the fight against financial crime, banks and other financial institutions need to share data, […] The post Why Tackling Financial Crime Calls for A…
Why You Can’t Have True Zero Trust Without API Security
By Richard Bird, Chief Security Officer, Traceable Global adoption of Zero Trust security models is soaring and with good reason. Due to organizations’ embrace of digital business models and enablement […] The post Why You Can’t Have True Zero Trust…
There’s no way you’re still using Consumer Messaging Apps for Business
By Nicole Allen, Senior Marketing Executive, Salt Communications Consumer messaging apps are routinely utilised for business purposes even if they were intended for personal usage. However, because of the legal […] The post There’s no way you’re still using Consumer…
Top 5 Questions to Ask When You’re Building a Cloud Security Strategy
By Metin Kortak, chief information security officer, Rhymetec As companies began moving their computing operations and data storage to the cloud, the security of these digital assets has been a […] The post Top 5 Questions to Ask When You’re…
Vulnerability Prioritization is Not a One-Size Fits All Approach
By Victor Gamra, CISSP, Founder and CEO of FortifyData System vulnerabilities are ever increasing as adoption of new and emerging technologies are implemented. Security professionals struggle to keep up with […] The post Vulnerability Prioritization is Not a One-Size Fits…
Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future
By Dr Ali El Kaafarani, Founder and CEO of PQShield July 5th, 2022, marked an important milestone in the fight to secure sensitive data against future cyber-attacks from quantum computers. […] The post Why Businesses Need to Leverage the NIST…
Remaining Proactive at Identifying Risks Keeps You Ahead of Hackers
By Carl Torrence, Content Marketer at Marketing Digest Why is cybersecurity such a big issue in organizations all over the world? It’s simple — Data breaches end up in loss […] The post Remaining Proactive at Identifying Risks Keeps You…
Solving The AppSec Dilemma Across the Entire SDLC
Why organizations should adopt an integrated and continuous approach to application security education By Amy Baker, Security Education Evangelist, Security Journey The software supply chain is under increasing threat. With […] The post Solving The AppSec Dilemma Across the Entire…
The Biggest Cyber Threats For The Financial Industry In 2023
By Ben Herzberg, Chief Scientist of Satori According to external market data, the financial sector was the most attacked in 2022 by DDoS attacks, while the number of all attacks […] The post The Biggest Cyber Threats For The Financial…
The California Consumer Privacy Act (CCPA) and the American Data Privacy Protection Act: The Good, The Bad and The Ugly
By Dr. Eric Cole, Advisor – Theon Technology Since 2018, there has been serious discussion of a new national privacy law promising Americans enhanced data protection, much like the European […] The post The California Consumer Privacy Act (CCPA) and…
“The Impact of Mobile Threats on SMBs: 10 Simple Ways to Empower Your Company.”
By Wendy Taccetta, SVP, Small and Medium Business for Verizon Business The shift in our hybrid and remote working world and the increase in mobile device use allow for a […] The post “The Impact of Mobile Threats on SMBs:…
Securing Collaboration at the Speed of Business
By Ofer Klein, CEO and co-founder, Reco Recent research found that 96% of business leaders believe that effective communication is key to a productive remote or hybrid work. And Slack […] The post Securing Collaboration at the Speed of Business…
Sell tickets to Fans, Not to Bots.
By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase a ticket for an event only to discover they are […] The post Sell tickets to Fans, Not to Bots.…
Product Review of SpecOps Password Policy
Looking for a tool to validate if your Active Directory (AD) passwords are safe across your Enterprise? Why would this be important? There are a few solutions in the industry […] The post Product Review of SpecOps Password Policy appeared…
Lessons From the Uber Hack
By Tomasz Kowalski, CEO and Co-Founder, Secfense For decades, cybersecurity experts have been warning us against weak or stolen passwords. Two-factor authentication (2FA) has always been pointed out as the […] The post Lessons From the Uber Hack appeared first…
Our Nation Needs Comprehensive AI Legislation, And Soon
By Dr. Allen Badeau, Chief Technology Officer, Empower AI The White House recently launched an “AI Bill of Rights” framework to lay the groundwork for the future creation and use […] The post Our Nation Needs Comprehensive AI Legislation, And…
How Zero Trust Enables More Effective Security Management
Moving to Zero Trust Architecture as a standard By Jim Hietala, Vice President of Business Development and Security at The Open Group There’s a huge buzz around Zero Trust in […] The post How Zero Trust Enables More Effective Security…
Industry Experts Share Their Security Predictions for 2023
Insights on the trends all businesses need to look out for By Multiple Authors It’s no surprise that security is a major topic of conversation, with cyberattacks of all kinds […] The post Industry Experts Share Their Security Predictions for…
Making the most of your time at the RSA 2023 conference
Ben Rothke, CISSP, CISM, CISA, is a Senior Information Security Manager at Tapad Going to RSA 2023? Failing to plan is planning to fail. With the RSA 2023 conference starting on April […] The post Making the most of your time at…
Has Adoption of ‘Connected Devices’ Outpaced Security?
By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of connected devices but the speed at which these devices have […] The post Has Adoption of ‘Connected Devices’ Outpaced Security?…
How to Stay GDPR Compliant While Sending Cold Emails
Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important marketing technique for any business that depends on reaching new, […] The post How to Stay GDPR Compliant While Sending…
Europe Envies America’s Cybersecurity Industry. What Can We Learn from It?
Europe’s cyber industry has huge potential. Copying what’s worked in the US is a route to realising that promise. By Carlos Moreira Silva and Carlos Alberto Silva, Managing Partners at […] The post Europe Envies America’s Cybersecurity Industry. What Can…
Expanding Macroeconomic Pressure And Attack Surface Will Drive Security Automation In 2023
By Leonid Belkind, CTO and Co-Founder, Torq Security automation continued to have significant, positive impact across myriad cybersecurity applications in 2022, with enterprises adopting and deploying no-code platforms to significant […] The post Expanding Macroeconomic Pressure And Attack Surface Will…
Cybersecurity: Your Guide to Digital Identity
Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works and why it matters. By Filip Verreth, VP Product Management […] The post Cybersecurity: Your Guide to Digital Identity appeared…
Does Your Company Have a Dark Data Problem?
By Dannie Combs, SVP and Chief Information Security Officer, Donnelley Financial Solutions (DFIN) Don’t let the name fool you: dark data is all too visible — to bad actors, that […] The post Does Your Company Have a Dark Data…
Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush?
By Camellia Chan, CEO & founder of Flexxon I was honored to be one of the representatives from 36 nations, the EU, and private sector companies who convened October 31-November […] The post Can The US-Led Multinational Counterattack Stop Ransomware’s…
Cybersecurity Attacks To Come: Here’s How To Prepare
By Russ Reeder, CEO, Netrix Global Ensuring 100% prevention against all cyberattacks is impossible today, as modern perpetrators find more sophisticated ways to strike by the minute. A strategy focusing […] The post Cybersecurity Attacks To Come: Here’s How To…
Busting Myths Around Cybersecurity Team Training
New Research Results from Omdia and Cybrary Point to Substantial ROI From Continuous Upskilling of Cybersecurity Teams. By Kevin Hanes, CEO, Cybary In recent years, cybersecurity has garnered a staggering […] The post Busting Myths Around Cybersecurity Team Training appeared…
5 Best Practices for a Multi-Factor Authentication (MFA) Strategy
By Zac Amos, Features Editor, ReHack Organizations and individuals must implement multi-factor authentication strategies to enhance any cybersecurity risk management plan. Cyberthreats have always been creative, but increasing attacks requires […] The post 5 Best Practices for a Multi-Factor Authentication…
2023 Predictions
By Dr. Chenxi Wang, Founder and Managing General Partner, Rain Capital For venture capitalists and investors with an eye on technology, 2022 was a chaotic year. This turmoil was partly […] The post 2023 Predictions appeared first on Cyber Defense…
New Threat Report Shows Attackers Increasingly Exploiting MFA Fatigue
By Ben Brigida, Director, Security Operations, Expel If you want to know what’s happening in the cybersecurity world, it helps to have up-to-date information. That means staying on top of […] The post New Threat Report Shows Attackers Increasingly Exploiting…
The Future of Online Privacy
By Mia Naumoska, Chief Marketing Officer at Internxt You’ve probably noticed that there’s a lot of bad news about online privacy these days. Security breaches and data leaks are everywhere, […] The post The Future of Online Privacy appeared first…
Why Ransomware Costs Need to be Prioritized in Your 2023 Budget
By Anurag Lal, CEO and President of NetSfere No one expects a hostage takeover, ever. Businesses never think a ransomware attack could happen to them, and yet it very well […] The post Why Ransomware Costs Need to be Prioritized…
4 Key Security Trends For 2023
By Jonathan Lee, Senior Product Manager, Menlo Security 2022 has unfortunately failed to live up to hopes for calmer waters. While it seems as though the worst effects of the […] The post 4 Key Security Trends For 2023 appeared…
Why Low-Code AI Is Needed Now More Than Ever
By Solomon Ray, Director of Innovation, Strategy, and Special Projects at Iterate.ai As a business leader and executive, a “low-code strategy” may not be on the top of your mind, […] The post Why Low-Code AI Is Needed Now More…
SMB Cyber Insurance: The End of Innocence
By Nadav Arbel, Co-founder & CEO, CYREBRO The cyber insurance landscape has changed dramatically in recent years – for both insurers and policyholders. In many ways, the past two years […] The post SMB Cyber Insurance: The End of Innocence…
Why Power Matters in Cyber Protection
Defending power management equipment in an era of more connectivity By James Martin, Global Connectivity Product Manager, Eaton It’s well understood that as digital evolution continues opening doors for greater […] The post Why Power Matters in Cyber Protection appeared…
Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
By Tyler Farrar, CISO, Exabeam According to the Exabeam State of the SIEM survey, security professionals remain confident in the face of modernizing adversaries despite rising breach numbers. The survey […] The post Organizations Have Security Priorities Mismatched as Breaches…
Why “Point-In-Time” Solutions Are Losing The Battle Against Sophisticated Fraud
By Alisdair Faulkner, CEO at Darwinium Cybersecurity and fraud teams have been locked in a technology arms race with their adversaries for years. Once again, they are on the back […] The post Why “Point-In-Time” Solutions Are Losing The Battle…
Cyber Defense Magazine– PQC & Biometrics
Why biometric security is crucial in a post-quantum world By Nils Gerhardt, Chief Technology Officer for Utimaco Many are saying that passwords have now become obsolete – they can be […] The post Cyber Defense Magazine– PQC & Biometrics appeared…
Virtual Security and why it matters so much to SMEs
By Jack Viljoen, Head of Marketing, Prodinity In recent years, there has been an exponential rise in the number of cyber criminals targeting small to medium-sized businesses (SMEs) – many […] The post Virtual Security and why it matters so…
Top 100 Women in Cybersecurity
Abbott Ekta Sirwani https://www.linkedin.com/in/ekta-sirwani/ Absolute Christy Wyatt https://www.linkedin.com/in/christywyatt/ Alert Logic Sydna Kelley https://www.linkedin.com/in/sydnakelley/ Alta Associates Joyce Brocaglia https://www.linkedin.com/in/joycebrocaglia/ AppEsteem Corporation Hong Jai https://www.linkedin.com/in/hong-jia-02234654/ Assurant Marilyn Piccolo https://www.linkedin.com/in/marilyn-piccolo-777a728/ Attivo Networks Sarah […] The post Top 100 Women in Cybersecurity appeared first…
Upskilling And Automation The Keys To Cyber Resilience For Businesses
Why investing in cybersecurity measures is more important than ever, despite challenging economic times By Achi Lewis, Area VP EMEA, Absolute Software At a time where cybercrime is on the […] The post Upskilling And Automation The Keys To Cyber…
User Behavior Analytics in Case Management
By Milica D. Djekic, Independent Researcher from Subotica, the Republic of Serbia. Abstract: Some criminology studies suggest crime can be committed by coping with some schemes, plans or patterns as […] The post User Behavior Analytics in Case Management appeared…
Top 100 Cybersecurity Startups
10dot https://10dot.com/ Acronis https://www.acronis.com/ Alertot https://www.alertot.com/ Aqua https://www.aquasec.com/ Argus Security https://www.argussecurity.it/ Augmenta Cyber Security https://augcyba.com/ Auth0 https://auth0.com/ Authomize https://www.authomize.com/ Axis Security https://www.axissecurity.com/ Axonius https://www.axonius.com/ Axur https://axur.com/ Balbix https://www.balbix.com/ Black […] The post Top 100 Cybersecurity Startups appeared first on…
Top 100 CISOs
These CISOs competed against thousands of candidates for this prestigious award. Judges look at these candidates, searching for the most innovative, with unparalleled success in communicating with their boards […] The post Top 100 CISOs appeared first on Cyber…
Unwitting Insider Threats Remain A Challenge As Security Solutions Struggle To Keep Up
By Chip Witt, Vice President of Product Management at SpyCloud Ransomware continues to be a rising and persistent threat to organizations, with research showing that 50% of organizations have been […] The post Unwitting Insider Threats Remain A Challenge As…
The Top 10 Predictions For The Cybersecurity Industry In 2023
By Christopher Prewitt, Chief Technology Officer, Inversion6 Technology never stops moving forward. Each new year brings changes which create downstream effects on how we are attacked and how we defend […] The post The Top 10 Predictions For The Cybersecurity…
Typical Cybersecurity Methods Aren’t Enough to Support the Modern Workforce
By Gee Rittenhouse, CEO, Skyhigh Security It’s time to adopt a zero-trust approach. Organizations in all sectors are adopting the hybrid workforce model, and this is forcing a shift in […] The post Typical Cybersecurity Methods Aren’t Enough to Support…
Understand And Reduce The Sap Attack Surface
By Christoph Nagy, CEO & Co-Founder, SecurityBridge Knowing the attack surface in today’s world is very important to reduce the risk of exploitation of the so-called unknown-unknown. Zero days are […] The post Understand And Reduce The Sap Attack Surface…
The Quantum Threat: Our Government Knows More Than You Do
By Skip Sanzeri, COO and Founder, QuSecure, Inc. Quantum computers are extremely powerful machines that utilize subatomic properties providing amazing potential to change the way that we process information and […] The post The Quantum Threat: Our Government Knows More…
The Importance To Provide Buyers And Sellers Secure, Convenient, And Frictionless Payment Experiences
By Héctor Guillermo Martínez, President GM Sectec The COVID-19 pandemic accelerated the adoption of digital payments globally and especially in Latin America and the Caribbean, as buyers and sellers continue […] The post The Importance To Provide Buyers And Sellers…
The Psychology Behind Spear Phishing Scams
By Dr. Yvonne Bernard, CTO, Hornetsecurity Criminals are increasingly using fake emails to exploit their victims for financial gain and are using spear phishing takes the well-known social engineering scam […] The post The Psychology Behind Spear Phishing Scams appeared…
The Benefits of eBPF for API Security
By Sanjay Nagaraj, Co-Founder & CTO of Traceable AI You might hear the term “eBPF” mentioned when chatting to DevOps and DevSecOps folks about network, infrastructure or security management. eBPF […] The post The Benefits of eBPF for API Security…
Table Stakes Security Services for 2023
By Jim Mundy, Director of Security Operations, Segra Most business owners may be aware of cybersecurity defenses such as firewall, DDoS prevention, or various endpoint protection solutions, and assume some […] The post Table Stakes Security Services for 2023 appeared…
The ‘New Cold War’ Continues To Mark Urgency For Organisations To Bolster Cyber-Resilience
By Dave Adamson, Chief Technology Officer at Espria Encourages businesses to re-claim authority over their networks, thereby enhancing cyber-resilience in the wake of current geopolitical conflicts. It’s no secret that […] The post The ‘New Cold War’ Continues To Mark…
NetFlow’s Dirty Little Secret
By Mark Evans, VP Marketing, Endace Many organizations assume their security tools can see everything that happens across the network to detect potential threats. Unfortunately, that’s not the case, for […] The post NetFlow’s Dirty Little Secret appeared first on…
Secure APIs to Drive Digital Business
By Mourad Jaakou, General Manager Amplify at Axway Back in 2010, API Evangelist blogger Kin Lane posited that application programming interfaces (APIs) are driving the Internet and our economy. A […] The post Secure APIs to Drive Digital Business appeared…
Security in gaming: How to Recognize and Prevent Social Engineering Attacks in Gaming
What is social engineering? By Jenna Greenspoon, Head of Parenting, Kidas As an avid internet user, it’s likely that at some point, you received an intriguing email with a subject […] The post Security in gaming: How to Recognize and…
Table Stakes Security Services for 2023
By Jim Mundy, Director of Security Operations, Segra Most business owners may be aware of cybersecurity defenses such as firewall, DDoS prevention, or various endpoint protection solutions, and assume some […] The post Table Stakes Security Services for 2023 appeared…
Moola Market Manipulation
Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a non-custodial liquidity protocol operating on the Celo blockchain – suffered […] The post Moola Market Manipulation appeared first on Cyber…
Managing Cybersecurity for Critical National Infrastructure
General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant, Artech, LLC What’s the reality of managing a cybersecurity program […] The post Managing Cybersecurity for Critical National Infrastructure appeared…
Remote Workers Face Growing Threats from Phishing Attacks
Analysis Shows Phishing Strikes Up 61% Over 2021, With a 50% Increase on Mobile Devices By Patrick Harr, CEO, SlashNext Hybrid offices and BYOD policies have reorganized the workplace forever, […] The post Remote Workers Face Growing Threats from Phishing…
Mobile App APIs Are Crucial to Businesses – But Are Under-Protected
The State of Mobile Security in 2022” Underscores Both the Importance of Mobile Apps and the Relative Lack of Resources Being Allocated to Runtime App and Data Protection. By David […] The post Mobile App APIs Are Crucial to Businesses…
Infrastructure-as-Code Security: a Critical Responsibility
By Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries. Although its principles have been established for over half a […] The post Infrastructure-as-Code Security: a Critical Responsibility appeared first…
How Does a Botnet Attack Work?
By Zac Amos, Features Editor, ReHack Keeping up with cybercriminals is a full-time job, as new attack types appear daily. Cybersecurity analysts must consider botnet attacks among classic ransomware and […] The post How Does a Botnet Attack Work? appeared…
How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce
By Raul Popa, CEO & Co-Founder, TypingDNA Like other types of insurance, Cybersecurity Insurance protects businesses in case of a rainy day. But as breaches become commonplace, insurers are running […] The post How To Reduce Rising Cyber Insurance Costs…
How 5G Networks Are Secured and Enabled By SASE
By Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and environments, there are important deployment and security considerations. While still […] The post How 5G Networks Are Secured and Enabled…
The Rise in Cyber-Attacks from Bad International Actors
There has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems from organizations approaching encryption wrong. By Scott Bledsoe, CEO, Theon Technology […] The post The Rise in Cyber-Attacks from Bad International…
Doenerium: When Stealing from Thieves Is Also a Crime
By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat experts uncovered a particularly worrying and sophisticated phishing attack that […] The post Doenerium: When Stealing from Thieves Is Also…
Five Ways to Keep Endpoint Protection Simple
By Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve. In fact, research shows that 68% of organizations have experienced […] The post Five Ways to Keep Endpoint Protection Simple…
DevSecOps and Digital Transformation: Bridging the Security Gap
How DevSecOps Ensure Security in Development Lifecycle? By Sudeep Srivastava, CEO, Appinventiv The Covid-19 pandemic has accelerated digital transformation to a staggering speed. However, for most organizations going digital has […] The post DevSecOps and Digital Transformation: Bridging the Security…
Why Defensive Superiority Should Rein Over Offensive Capability
By Marcus Fowler, SVP of Strategic Engagements and Threats at Darktrace Amid a near-constant cycle of cyber incidents globally, organizations and institutions in both the private and public sectors must […] The post Why Defensive Superiority Should Rein Over Offensive…
As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture
By Jonathan Goldberger, SVP Security Practice, TPx The increasingly dangerous security landscape is particularly concerning to businesses, as they face increasing cyberattack threats. Instead of fearing the unknown, business owners […] The post As Online Threats Facing Businesses Grow, Companies…
Applying the NIST Framework to Ransomware Risk Management
Top Takeaways for Preparing for and Managing a Ransomware Attack with NISTIR 8374 By Gil Kirkpatrick, Microsoft MVP […] The post Applying the NIST Framework to Ransomware Risk Management appeared first on Cyber Defense Magazine. This article has been indexed…
Compliance Is the Key to Unlocking Government Contractor Success
By Dan Firrincili, Senior Manager, Product Marketing at Deltek In 2021, President Biden signed the Cybersecurity Executive Order […] The post Compliance Is the Key to Unlocking Government Contractor Success appeared first on Cyber Defense Magazine. This article has been…
Cyber Threats Driving Insurance Claims Activity
By Scott Sayce, Global Head of Cyber and Group Head of the Cyber Centre of Competence at Allianz […] The post Cyber Threats Driving Insurance Claims Activity appeared first on Cyber Defense Magazine. This article has been indexed from Cyber…
Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?
By Geoffrey Lottenberg Imagine a swarm of termites secretly and incessantly feeding on your home. In relative silence, […] The post Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive? appeared first on Cyber Defense Magazine.…
Automated Patch Management Can Protect Your Business from A Data Disaster
By Sami Mäkiniemelä, Chief Security Officer, Miradore It’s easy to identify security needs from physical threats we can […] The post Automated Patch Management Can Protect Your Business from A Data Disaster appeared first on Cyber Defense Magazine. This article…
Common Vulnerabilities of Enterprise Web Security That Demands Your Attention
By Eden Allen, Cyber Security Educator, CheapSSLWeb Years ago, the way leading enterprise-level concerns were viewed differed from […] The post Common Vulnerabilities of Enterprise Web Security That Demands Your Attention appeared first on Cyber Defense Magazine. This article has…
5 Ways to Protect Your Workplace from Cybersecurity Threats
By Nicole Allen, Senior Marketing Executive, Salt Communications. The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving […] The post 5 Ways to Protect Your Workplace from Cybersecurity Threats appeared first on Cyber Defense Magazine. This article has been…