Tag: Cyber Defense Magazine

Unlocking Secure Communications 101: The Fundamentals

Ensuring the protection of data and communications is of utmost importance for organisations adapting to the intricacies of the digital era. Are you knowledgeable about secure communications? Whether you’re new… The post Unlocking Secure Communications 101: The Fundamentals appeared first…

Innovator Spotlight: Cymulate

AI Copilot: Revolutionizing Threat Exposure Validation by Samridhi Agarwal, Master’s Student, CMU During BlackHat, Cymulate, a leader in security and exposure validation, has officially launched Cymulate AI Copilot, an innovative,… The post Innovator Spotlight: Cymulate appeared first on Cyber Defense…

Innovator Spotlight: Illumio

Pioneering Zero Trust Segmentation for Comprehensive Cybersecurity by Samridhi Agarwal, Master’s Student, CMU In today’s rapidly evolving cybersecurity landscape, organizations face increasingly sophisticated threats that can breach even the most… The post Innovator Spotlight: Illumio appeared first on Cyber Defense…

Innovator Spotlight: Fortanix

Unveiling Secure Data Practices in a World of AI Risks by Samridhi Agarwal, Master’s Student, CMU In an era where artificial intelligence is becoming increasingly prevalent, organizations face new and… The post Innovator Spotlight: Fortanix appeared first on Cyber Defense…

Innovator Spotlight: Expel

Leading the Charge in Managed Detection and Response by Samridhi Agarwal, Master’s Student, CMU In a conversation with Greg Notch, CISO at Expel, explored the increasing sophistication of cyber threats,… The post Innovator Spotlight: Expel appeared first on Cyber Defense…

Spotlight on Oleria

Q&A with OIeria CEO Jim Alkove: Identity is the keystone to the future of cybersecurity and a critical area for companies to focus on because it’s where attackers are moving…. The post Spotlight on Oleria appeared first on Cyber Defense…

Innovator Spotlight: Salt Security

In a world where APIs have become integral to the digital and technical experience, they also represent a significant security risk, often flying under the radar of traditional security solutions…. The post Innovator Spotlight: Salt Security appeared first on Cyber…

Innovator Spotlight: HUMAN

During my conversation with Lindsay Kaye, VP of Threat Intelligence at HUMAN Security, she emphasized how HUMAN tackles some of the most complex and overlooked threats in today’s digital landscape…. The post Innovator Spotlight: HUMAN appeared first on Cyber Defense…

Innovator Spotlight: Tanium

During my conversation with Melissa Bischoping, Senior Director of Security & Product Design Research at Tanium, she emphasized how the company addresses the critical challenge of operational risk and security… The post Innovator Spotlight: Tanium appeared first on Cyber Defense…

Innovator Spotlight: Keepnet Labs

Human error remains one of the most significant vulnerabilities in cybersecurity. Despite advances in technology and automated defenses, employees continue to be the primary target for cybercriminals, particularly through social… The post Innovator Spotlight: Keepnet Labs appeared first on Cyber…

Innovator Spotlight: Lineaje

Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving the way of cybersecurity innovation. … The post Innovator Spotlight: Lineaje appeared first on Cyber Defense…

Cyber Threats vs. Risks: Building a Proactive Cyber Defense

As cybersecurity threats continue to evolve in the ever-changing cyber landscape, organizations within every industry must implement a comprehensive security strategy to remain resilient in the face of attacks. While… The post Cyber Threats vs. Risks: Building a Proactive Cyber…

Why Legacy MFA is DOA

Multi-Factor Authentication (MFA) has long been heralded as a cornerstone of secure digital practices. However, the traditional forms of MFA, now often referred to as “legacy MFA,” are increasingly seen… The post Why Legacy MFA is DOA appeared first on…

Best Practices for Enterprise Security

Cyberattacks and data breaches are running rampant in enterprises, causing havoc and interrupting business operations. These nuisances are the last thing an organization wants to experience and can cause long-lasting… The post Best Practices for Enterprise Security appeared first on…

Innovator Spotlight: Cobalt

Pioneering Pentest as a Service (PtaaS) for Enhanced Offensive Security At BlackHat, we had the opportunity to speak with Jason Lamar, Cobalt’s Senior Vice President of Product, about the evolving… The post Innovator Spotlight: Cobalt appeared first on Cyber Defense…

Innovator Spotlight: BackBox

Revolutionizing Network Security Automation I recently spoke with Rekha Shenoy, CEO of BackBox during the BlackHat conference, and her insights into the tech industry and network security were nothing short… The post Innovator Spotlight: BackBox appeared first on Cyber Defense…

Innovator Spotlight: Delinea

Revolutionizing Identity Security with AI-Driven Solutions At BlackHat 2024, we had the pleasure of discussing the future of identity security with Phil Calvin, Chief Product Officer at Delinea. As organizations… The post Innovator Spotlight: Delinea appeared first on Cyber Defense…

Innovator Spotlight: Pentera

Revolutionizing Cybersecurity with Automated Security Validation In a conversation with Jay Mar-Tang, Field CISO at Pentera, it became clear that the landscape of cybersecurity is rapidly evolving. With the increasing… The post Innovator Spotlight: Pentera appeared first on Cyber Defense…

The Internet of Things Technological Perspective

The Internet of Things (IoT) is a boom which has come with the ongoing industrial progress and revolution offering something inexpensive and suitable to everyone, but yet quite unreliable and… The post The Internet of Things Technological Perspective appeared first…

Making Progress and Losing Ground

As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The good news is that many people are now aware of… The post Making Progress and Losing Ground appeared first on…

Innovator Spotlight: SNYK

It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to figure out the best way to fix it without breaking… The post Innovator Spotlight: SNYK appeared first on Cyber Defense…

Publishers Spotlight: Blumira

I was thrilled to catch up with Blumira during Black Hat USA 2024. When it comes to resource-constrained businesses, traditional security information and event management (SIEM) systems can seem like… The post Publishers Spotlight: Blumira appeared first on Cyber Defense…

Innovator Spotlight: ThreatLocker

In the rapidly evolving world of cybersecurity, incidents frequently arise when malicious code finds its way into trusted environments. These breaches can be triggered by seemingly harmless actions, such as… The post Innovator Spotlight: ThreatLocker appeared first on Cyber Defense…

Spotlight on Sysdig

As cloud environments continue to expand, so do the threats targeting them. In today’s fast-paced digital world, attacks on cloud infrastructure happen within 10 minutes, leaving traditional security tools struggling… The post Spotlight on Sysdig appeared first on Cyber Defense…

Spotlight on Akto.ai

As APIs become the backbone of digital transformation, they also represent one of the biggest security risks to organizations. According to Gartner, by 2025, APIs will be the top attack… The post Spotlight on Akto.ai appeared first on Cyber Defense…

Innovator Spotlight: Beyond Identity

At Black Hat 2024, I had the opportunity to speak with Jasson Casey, CEO of Beyond Identity, about their groundbreaking work in secure identity and access management (IAM). In an… The post Innovator Spotlight: Beyond Identity appeared first on Cyber…

Innovator Spotlight: Zenity

Another innovative industry leader I had the pleasure of speaking with was Michael Bargury, Co-Founder and CTO of Zenity, a pioneering company that is redefining how enterprises approach security for… The post Innovator Spotlight: Zenity appeared first on Cyber Defense…

Innovator Spotlight: Traceable AI

Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving the way for cybersecurity innovation…. The post Innovator Spotlight: Traceable AI appeared first on Cyber…

Innovator Spotlight: Reco.ai

As organizations increasingly rely on SaaS applications, the risk of data breaches and unauthorized access grows significantly. According to a 2024 study by the Ponemon Institute, 63% of data breaches… The post Innovator Spotlight: Reco.ai appeared first on Cyber Defense…

Spotlight on Simbian

The race to adopt AI-driven solutions has opened up new opportunities for businesses but has also introduced unprecedented risks in data integrity, compliance, and governance. According to Gartner, 40% of… The post Spotlight on Simbian appeared first on Cyber Defense…

Innovator Spotlight: DNSFilter

In today’s digital age, cybersecurity can often feel like a daunting challenge, with the constant fear of being just one click away from a potential compromise. For Timothy (TK) Keanini,… The post Innovator Spotlight: DNSFilter appeared first on Cyber Defense…

Innovator Spotlight: Gurucul

It was a privilege to meet with Saryu Nayyar, CEO of Gurucul, a prominent woman leader in the cybersecurity industry. As a fellow woman in this field, I was particularly… The post Innovator Spotlight: Gurucul appeared first on Cyber Defense…

Innovator Spotlight: Cyversity

Interview with Dr. Wade Holmes, member, Cyversity Board of Directors Cyversity is a 501(c)(3) organization whose mission is to achieve the consistent representations of women, underrepresented minorities, and all veterans… The post Innovator Spotlight: Cyversity appeared first on Cyber Defense…

Encryption of Data at Rest: The Cybersecurity Last Line of Defense

Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of cybersecurity, where threats are becoming increasingly sophisticated and pervasive, traditional… The post Encryption of Data at Rest: The Cybersecurity Last…

Sheltering From the Cyberattack Storm – Part Two

In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate against such an attack. But the cybersecurity storm doesn’t stop… The post Sheltering From the Cyberattack Storm – Part Two…

Innovator Spotlight: ArmorCode

As the world of software development accelerates, the need to secure applications from the earliest stages of development has become critical. The rise of DevSecOps has placed immense pressure on… The post Innovator Spotlight: ArmorCode appeared first on Cyber Defense…

Publisher’s Spotlight: Checkmarx

I was thrilled to catch up with Checkmarx during Black Hat USA 2024.  Cloud development transformation has ushered in a host of expanding security challenges: the rising number of point… The post Publisher’s Spotlight: Checkmarx appeared first on Cyber Defense…

Innovator Spotlight: DataBee™

The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…

Publisher’s Spotlight: Horizon3.ai

I was thrilled to catch up with Horizon3.ai during Black Hat USA 2024.  Most attackers don’t break in, they log in. CrowdStrike’s 2023 Global Threat Report findings confirm that 71%… The post Publisher’s Spotlight: Horizon3.ai appeared first on Cyber Defense…

Innovator Spotlight: DataBee™

The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…

Innovator Spotlight: Reach Security

Despite the increasing number of cybersecurity tools available, attacks continue to succeed at an alarming rate. Studies show that more than 70% of organizations only utilize 20% or less of… The post Innovator Spotlight: Reach Security appeared first on Cyber…

Innovator Spotlight: SecPod

Vulnerability management has become more critical than ever as the global cost of cybercrime is projected to reach $10.5 trillion annually by 2025. In a world where a cyberattack occurs… The post Innovator Spotlight: SecPod appeared first on Cyber Defense…

Innovator Spotlight: Cigent

As organizations increasingly rely on edge devices for data collection and processing, the risk of sensitive data breaches has escalated. The proliferation of traditional and emerging devices, such as IoT,… The post Innovator Spotlight: Cigent appeared first on Cyber Defense…

Innovator Spotlight: ExtraHop

As organizations face an escalating wave of cyberattacks, ransomware remains a top concern, with more than 91% of IT and security decision-makers admitting to having paid at least one ransom… The post Innovator Spotlight: ExtraHop appeared first on Cyber Defense…

Innovator Spotlight: Upwind

The rapid adoption of cloud technology has led to an explosion in complexity and vulnerability within modern infrastructures. In 2022, 45% of businesses reported cloud-based data breaches or failed audits,… The post Innovator Spotlight: Upwind appeared first on Cyber Defense…

Innovator Spotlight: Normalyze

In today’s fast-paced digital world, data breaches have become the norm, not the exception. With data sprawled across cloud, on-prem, and hybrid environments, organizations face critical challenges in maintaining visibility… The post Innovator Spotlight: Normalyze appeared first on Cyber Defense…

Innovator Spotlight: Harmonic Security

The rapid rise of generative AI (GenAI) has brought about both unprecedented opportunities and significant challenges for organizations, particularly in data protection. According to MIT research, 77% of organizations identify… The post Innovator Spotlight: Harmonic Security appeared first on Cyber…

Innovator Spotlight: AppSOC

The rapid adoption of AI and Generative AI applications has unlocked tremendous potential, but it has also introduced significant security risks that enterprises must address. Gartner predicts that by 2025,… The post Innovator Spotlight: AppSOC appeared first on Cyber Defense…

Publisher’s Spotlight: Cyera

I was thrilled to catch up with Cyera during Black Hat USA 2024. Over 90% of the world’s data was created in the last two years – making data the… The post Publisher’s Spotlight: Cyera appeared first on Cyber Defense…

Publisher’s Spotlight: Cranium

I was thrilled to catch up with Cranium during Black Hat USA 2024.  CISOs are feeling pressure from their CEOs and Boards to support these initiatives when they need more… The post Publisher’s Spotlight: Cranium appeared first on Cyber Defense…

Publishers Spotlight: Cranium

I was thrilled to catch up with Cranium during Black Hat USA 2024.  CISOs are feeling pressure from their CEOs and Boards to support these initiatives when they need more… The post Publishers Spotlight: Cranium appeared first on Cyber Defense…

Publishers Spotlight: Bedrock Security

I was thrilled to catch up with Bedrock Security during Black Hat USA 2024.  The surge in data volume from cloud and GenAI initiatives, coupled with escalating threats to enterprises’… The post Publishers Spotlight: Bedrock Security appeared first on Cyber…

The Hidden Threat of Shadow AI

In November 2022, ChatGPT launched, bringing new possibilities and challenges. As AI and GenAI have grown in popularity and use, businesses have had to grapple with how to use the… The post The Hidden Threat of Shadow AI appeared first…

Publishers Spotlight: ForAllSecure

I was thrilled to catch up with ForAllSecure during Black Hat USA 2024.  ForAllSecure is an organization of hackers, developers, and security professionals dedicated to research and innovation in the… The post Publishers Spotlight: ForAllSecure appeared first on Cyber Defense…

Publishers Spotlight: Endari

I was thrilled to catch up with Endari during Black Hat USA 2024.  Endari partners with startups and SMBs to enhance their cybersecurity maturity, integrating proactive security measures into their… The post Publishers Spotlight: Endari appeared first on Cyber Defense…

All-in-One: How Cynet is Revolutionizing Cybersecurity for MSPs

Managed Services Providers (MSPs) are increasingly looking to provide cybersecurity services due to the demand from their current clients. Though the revenue potential is lucrative, the road for many MSPs… The post All-in-One: How Cynet is Revolutionizing Cybersecurity for MSPs…

Internal And External Threat Intelligence

How To Balance the Two Sources In cybersecurity, threat intelligence covers a broad range of activities concerning collection, analysis, and dissemination of information on the current threat landscape. In terms… The post Internal And External Threat Intelligence appeared first on…

How To Respond to The Rise of Banking Trojans

The resurgence of banking trojans has become a major cybersecurity concern for financial institutions and their customers. These malicious backdoor programs continue to evolve and succeed due to their ability… The post How To Respond to The Rise of Banking…

Publishers Spotlight: SquareX

I was thrilled to catch up with SquareX during Black Hat USA 2024. SquareX is a cybersecurity startup that specializes in enhancing browser security and privacy through innovative solutions. The… The post Publishers Spotlight: SquareX appeared first on Cyber Defense…

Publisher’s Spotlight: Syxsense

I was thrilled to catch up with Syxsense during Black Hat USA 2024. Syxsense is a cybersecurity company that provides unified endpoint management and security solutions. The company specializes in… The post Publisher’s Spotlight: Syxsense appeared first on Cyber Defense…

Publishers Spotlight: F5

I was thrilled to catch up with F5 during Black Hat USA 2024. Years ago, when I started an innovative e-commerce company, we used their Big IP product to load… The post Publishers Spotlight: F5 appeared first on Cyber Defense…

Publishers Spotlight: Endace

Fundamental and Foundational to InfoSec and Regulatory Compliance is Capturing all Packets. Figure 1.  Endace High-Performance Packet-capture Appliance Endace specializes in always-on, hybrid-cloud packet capture, addressing the challenge of ensuring… The post Publishers Spotlight: Endace appeared first on Cyber Defense…

Defense in Diversity: A Strategy for Robust Cybersecurity

The concept of “defense in depth” dates back to ancient times, epitomized by the ramparts, draw-bridge, towers, and battlements surrounding a medieval castle.  Cybersecurity’s adaptation of the idea — multiple… The post Defense in Diversity: A Strategy for Robust Cybersecurity…

Publishers Spotlight: DigitalXForce

When I go to BlackHat I’m always looking for cyber innovation across many vectors including cyber resilience artificial intelligence and most importantly compliance. This year I met up with Lalit… The post Publishers Spotlight: DigitalXForce appeared first on Cyber Defense…

Shedding Light on The Dark Web: Enhancing Cybersecurity Through Proactive Monitoring

In the digital age, the dark web has emerged as a clandestine marketplace for illicit activities, including the sale of stolen data, illegal software and various forms of malware. The proliferation of these marketplaces poses significant threats to personal, corporate and national security. As… The post Shedding Light on The Dark Web: Enhancing Cybersecurity…

Maximizing Cybersecurity Impact Within Budget Constraints

Cybersecurity is the cornerstone of organizational stability and resilience today. Despite its critical importance, budgetary allocations often fall short due to competing priorities. Mimecast recently surveyed 1,100 CISOs and information… The post Maximizing Cybersecurity Impact Within Budget Constraints appeared first…

Looking Past DevOps: AI, ClickOps and Platform Engineering

About fifteen years ago, DevOps radically overhauled the world of software engineering. Previously, the development process had been defined by sometimes maddening delays, as development teams waited for operations teams… The post Looking Past DevOps: AI, ClickOps and Platform Engineering…

Mitigating Data Breaches with AI-Driven Security Solutions

SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes, even those equipped with robust security measures. As cybercriminals become… The post Mitigating Data Breaches with AI-Driven Security Solutions appeared…

The Dual Nature of Ransomware Attacks

Financial Gain and Geopolitical Strategy Ransomware attacks have evolved from mere cybercriminal activities to sophisticated operations serving dual purposes: financial gain for attackers and advancing the geopolitical objectives of adversarial… The post The Dual Nature of Ransomware Attacks appeared first…