Tag: Cyber Defense Magazine

Rethinking SAP Security Without Maintenance Contracts

Do you rely on SAP maintenance contracts to keep vulnerabilities in check? Here’s a question: have you felt the sting of renewal season? Those spiraling costs are hard to ignore—just… The post Rethinking SAP Security Without Maintenance Contracts appeared first…

Unpacking Disinformation in the 2024 US Presidential Election

The 2016 U.S. presidential election is often cited as a watershed moment for digital disinformation campaigns – revealing the vulnerability of democratic processes to foreign interference and the spread of… The post Unpacking Disinformation in the 2024 US Presidential Election…

Key Cybersecurity Themes for 2025

Cyber threats are evolving faster than ever, and security leaders can’t afford to fall behind. That’s why we created the 2025 Fortra State of Cybersecurity Survey—to provide valuable insights that help SOCs,… The post Key Cybersecurity Themes for 2025 appeared first on…

Can Standards Deal a Deathly Blow Against Deepfakes?

Recent advances in generative artificial intelligence (AI) are making it increasingly difficult to know the difference between what is real and what is not. Computer-generated clips that are designed to… The post Can Standards Deal a Deathly Blow Against Deepfakes?…

AI-Powered Testing: Innovation, Risks, and What Comes Next

Artificial intelligence (AI) is transforming software testing, driving unparalleled speed, accuracy, and coverage in comparison to traditional, manual methods. However, all good things come at a cost. As organizations integrate… The post AI-Powered Testing: Innovation, Risks, and What Comes Next…

AI-Powered Cyber Attacks and Data Privacy in The Age of Big Data

The fast transformation and evolution of artificial intelligence (AI) significantly changed the general norm and operational process of industries. This drastically transformed different sectors of industries related to finance, healthcare… The post AI-Powered Cyber Attacks and Data Privacy in The…

How can Organizations Secure Low-Code No-Code Development

Applications developed by citizen developers are on the rise. Low-code and no-code (LCNC) platforms are reshaping the development ecosystem. These tools are broadening horizons and enabling citizen developers to create… The post How can Organizations Secure Low-Code No-Code Development appeared…

AI Addressing New Need to Secure Data from The Inside Out

Today’s traditional perimeter-based cybersecurity measures are increasingly inadequate due to threats that arise from within an organization. Whether born of malice or mistake, it’s clear that insider threats are only… The post AI Addressing New Need to Secure Data from…

Preparing For The AI-Generated Cyber Threats Of 2025

There has been a gradual but alarming shift in the digital threat landscape over the last few years, as Advanced Persistent Threats (APTs) become more prominent and more potent. The… The post Preparing For The AI-Generated Cyber Threats Of 2025…

How Cybersecurity is Evolving in 2025 to Tackle New Threats

The cybersecurity landscape continues to evolve at breakneck speed. In the U.S., regulatory policy at the federal level – for instance, the National Cybersecurity Strategy launch and the SEC’s Cybersecurity… The post How Cybersecurity is Evolving in 2025 to Tackle…

How Ghostgpt Is Empowering Cybercrime in The Age Of AI

Artificial Intelligence (AI) has significantly transformed various sectors, offering tools that enhance efficiency and innovation. However, the emergence of uncensored AI chatbots like GhostGPT has introduced new challenges in cybersecurity…. The post How Ghostgpt Is Empowering Cybercrime in The Age…

The Cyber Insurance Conundrum

While cybercriminals innovate at lightning speed, cybersecurity teams—led by Chief Information Security Officers (CISOs)—often find themselves relying on outdated playbooks. Cyber insurance, once viewed as the ultimate safety net, is… The post The Cyber Insurance Conundrum appeared first on Cyber…

Best Practices and Risks Considerations in Automation like LCNC and RPA

Technologies such as Low-Code/No-Code (LCNC) and Robotic Process Automation (RPA) have become fundamental in the digital transformation of companies. They continue to evolve and redefine software development, providing new possibilities for different… The post Best Practices and Risks Considerations in Automation like…

Navigating Cyber Security Implementation Challenges in SMBs

Cyber Security is often low priority for SMBs. Many SMBs lack dedicated security specialist; instead, security responsibilities are typically handled by IT department which is already overwhelmed with general IT… The post Navigating Cyber Security Implementation Challenges in SMBs appeared…

White Paper: Advancing Cybersecurity Through Kernel Immunization

PT SYDECO, an innovative Indonesian company specializing in IT security committed to pushing the boundaries of cybersecurity through cutting-edge solutions adapted to modern threats, presents a revolutionary approach to cybersecurity:… The post White Paper: Advancing Cybersecurity Through Kernel Immunization appeared…

The CISO’s Myopia

Fifteen years ago, I wrote an article entitled “The CSO’s Myopia.” At the time, I aimed to highlight a critical limitation in information security management. I demonstrated how many information… The post The CISO’s Myopia appeared first on Cyber Defense…

Complexity: The Silent Killer of Cybersecurity

The cybersecurity landscape is a complex and ever-evolving ecosystem. At its core lies a fundamental paradox: the more tools we deploy to protect our digital assets, the more complex and… The post Complexity: The Silent Killer of Cybersecurity appeared first…

Why EPSS is a Game-Changer for Cybersecurity Risk Management

Having served on the MITRE.org CVE (OVAL) advisory board, I have spent years analyzing vulnerabilities and how they impact global cybersecurity. The challenge has always been prioritization—how do we determine… The post Why EPSS is a Game-Changer for Cybersecurity Risk…

Maximizing Security Through Hardware

Organizations are continually balancing seamless user experiences and implementing robust defenses against evolving threats. Passwords, as the first line of defense, remain a primary vulnerability, often exploited due to poor… The post Maximizing Security Through Hardware appeared first on Cyber…

Publishers Spotlight: Flashpoint

In 2024, a new hybrid cold war is redefining the threat landscape. Cyber, physical, and geopolitical risks are converging, with nation-states, ransomware groups, and insider threats exploiting vulnerabilities to disrupt… The post Publishers Spotlight: Flashpoint appeared first on Cyber Defense…

Experience from GAP Assessment Audits for NIS2 Compliance

The NIS2 (Directive (EU) 2022/2555 of the European Parliament and of the Council) imposes cybersecurity and information security compliance obligations on many organizations that previously had no such requirements. Most… The post Experience from GAP Assessment Audits for NIS2 Compliance…

Deepfakes: How Deep Can They Go?

With the help of today’s technology, virtually anyone can create a passable deepfake—a manipulated image, video, or audio recording that seems real. All that is required is a consumer-grade computer… The post Deepfakes: How Deep Can They Go? appeared first…

How to Root Out Malicious Employees

Malicious employees and insider threats pose one of the biggest security risks to organizations, as these users have more access and permissions than cyber criminals attacking the organisation externally. It… The post How to Root Out Malicious Employees appeared first…

Cyber Security in Customer Engagement: The Triple Defence Strategy

As digital interactions dominate modern communication, the rapid evolution of cyber threats demands robust security measures in customer engagement as a critical imperative. Traditional security methods are no longer sufficient,… The post Cyber Security in Customer Engagement: The Triple Defence…

Can Your Security Measures Be Turned Against You?

Throughout history, the concept of defeating an opponent’s defenses has been central to warfare strategies. From ancient sieges using tunnels and siege engines to modern tactics aimed at neutralizing air… The post Can Your Security Measures Be Turned Against You?…

Bridging The Manufacturing Security “Air Gap”

In the world of manufacturing, one security measure has stood out above all others: the “air gap.” This technique, which isolates technology from the outside world, once provided a reasonable… The post Bridging The Manufacturing Security “Air Gap” appeared first…

The GenAI Scam Revolution

Introduction The intersection of cutting-edge artificial intelligence technologies and the extensive exposure of personal data has opened a Pandora’s box of potential misuse, including hyper-targeted scams. Large language models (LLMs),… The post The GenAI Scam Revolution appeared first on Cyber…

Navigating Advanced Threat Landscapes

In today’s era, marked by rapid digital transformations and an increase in sophisticated cyber threats, the role of Chief Information Security Officers is more crucial than ever. CISOs face the… The post Navigating Advanced Threat Landscapes appeared first on Cyber…

The Rise in Phishing Scams

As cybersecurity platforms have become more effective, cyber attackers have shifted their strategy. Rather than challenging defense applications to identify weaknesses, they are now increasingly focused on exploiting human behavior…. The post The Rise in Phishing Scams appeared first on…

The Age of Unseen Truths And Deceptive Lies

From the moment we’re born, we are surrounded by a mix of true and false information. In the past, distinguishing between them was relatively easy, but over time, it has… The post The Age of Unseen Truths And Deceptive Lies…

Tagged Files as a Road to Insider Threats

The insider threat is any individual within community who does something against such surrounding even being used for sabotage, diversion, espionage and the other purposes, so far. On the other… The post Tagged Files as a Road to Insider Threats…

Operational Security: The Backbone of Effective Police Communication

In the fast-paced and dynamic world of law enforcement, effective communication is essential for ensuring public safety and successful operations. However, amidst the ever-evolving landscape of technology and threats, maintaining… The post Operational Security: The Backbone of Effective Police Communication…

Passwords Are Out, Biometrics Are In

As more aspects of daily life move online—including financial transactions, government services like mobile driver’s licenses, and digital travel authentication—the weaknesses of traditional remote identity verification methods, such as passwords,… The post Passwords Are Out, Biometrics Are In appeared first…

Managing Sensitive Security Investigations in Remote Settings

Managing sensitive security investigations has become more complex and challenging in today’s increasingly prevalent remote work environment. As a result, ensuring that these investigations are conducted effectively and securely requires… The post Managing Sensitive Security Investigations in Remote Settings appeared…

Is Unified Access Control Zero Trust’s Silver Bullet?

With the advent of Zero Trust architecture, where the principle of “never trust, always verify” prevails, the importance of comprehensive access control has never been more pronounced. As cyber threats… The post Is Unified Access Control Zero Trust’s Silver Bullet?…

HTTP 1.1 Vs. HTTP 2: What Are the Differences?

According to this recent report by McKinsey, 87% of consumers say they won’t do business with your company if they have concerns about your security practices. So if you’re serious about protecting… The post HTTP 1.1 Vs. HTTP 2: What Are the…

How to Use AI in Cyber Deception

For years, cyber deception has been an excellent tool against would-be cybercriminals. However, the cybersecurity landscape is constantly evolving — and many conventional techniques are no longer as effective. Is… The post How to Use AI in Cyber Deception appeared…

How To Privacy-Proof the Coming AI Wave

Everyone has noticed that we have entered the AI era. AI is everywhere: to improve customer experience, reduce costs, generate stunning and surreal images. The size of the Artificial Intelligence… The post How To Privacy-Proof the Coming AI Wave appeared…

Exploring the Vishing Threat Landscape

Voice phishing, also known as vishing, represents a growing threat to organizations worldwide. Keepnet’s 2024 Vishing Response Report illuminates the alarming statistic that 70% of companies are prone to voice… The post Exploring the Vishing Threat Landscape appeared first on…

Cybersecurity: How to Involve People in Risk Mitigation

Cybersecurity: how to involve people in risk mitigation Cefriel presented the white paper “Cyber Security and the Human Element”, an in-depth look at how to analyze and understand the connections… The post Cybersecurity: How to Involve People in Risk Mitigation…

Publisher’s Spotlight: Merlin Group

Bridging the Gap Between Cyber Innovation and Regulated Markets Addressing the Challenge of Innovation Access in Regulated Markets In an era where the need for technological innovation is more critical… The post Publisher’s Spotlight: Merlin Group appeared first on Cyber…

Air Gap

In August 2024, the FBI issued a notice that an Iranian backed team was attempting to hack American political parties’ campaign information. (Miller & Balsamo, 2024). In that same month,… The post Air Gap appeared first on Cyber Defense Magazine.…

Protecting Your Organization Against Advanced, Multi-Stage Cyber Attacks

Threat actors are continuously enhancing their techniques and increasing sophistication to evade cyber defenses. Consequently, multi-stage ransomware and malware attacks, characterized by heavy obfuscation are becoming increasingly prevalent. The Europol Threat… The post Protecting Your Organization Against Advanced, Multi-Stage Cyber Attacks…

The Cyber Defense Emergency Room

In cybersecurity like in the emergency room, every moment is critical. Much like an emergency room, where nurses must quickly assess and prioritize patients based on the severity of their… The post The Cyber Defense Emergency Room appeared first on…