Ensuring the protection of data and communications is of utmost importance for organisations adapting to the intricacies of the digital era. Are you knowledgeable about secure communications? Whether you’re new… The post Unlocking Secure Communications 101: The Fundamentals appeared first…
Tag: Cyber Defense Magazine
Fortifying The Digital Frontier: Everyday Habits That Shape Your Company’s Cybersecurity Posture
The importance of internet safety has never been more pronounced than in today’s digital age, where the boundaries between our personal and professional lives are increasingly blurred. However, with this… The post Fortifying The Digital Frontier: Everyday Habits That Shape…
Innovator Spotlight: Cymulate
AI Copilot: Revolutionizing Threat Exposure Validation by Samridhi Agarwal, Master’s Student, CMU During BlackHat, Cymulate, a leader in security and exposure validation, has officially launched Cymulate AI Copilot, an innovative,… The post Innovator Spotlight: Cymulate appeared first on Cyber Defense…
Innovator Spotlight: Illumio
Pioneering Zero Trust Segmentation for Comprehensive Cybersecurity by Samridhi Agarwal, Master’s Student, CMU In today’s rapidly evolving cybersecurity landscape, organizations face increasingly sophisticated threats that can breach even the most… The post Innovator Spotlight: Illumio appeared first on Cyber Defense…
Innovator Spotlight: Fortanix
Unveiling Secure Data Practices in a World of AI Risks by Samridhi Agarwal, Master’s Student, CMU In an era where artificial intelligence is becoming increasingly prevalent, organizations face new and… The post Innovator Spotlight: Fortanix appeared first on Cyber Defense…
Tips for Detecting and Preventing Multi-Channel Impersonation Attacks
Recently, the CEO of the world’s biggest advertising group, Mark Read, was the target of a deepfake scam using an AI-based voice clone. Read disclosed that scammers used a publicly available photo… The post Tips for Detecting and Preventing Multi-Channel Impersonation Attacks…
Innovator Spotlight: Expel
Leading the Charge in Managed Detection and Response by Samridhi Agarwal, Master’s Student, CMU In a conversation with Greg Notch, CISO at Expel, explored the increasing sophistication of cyber threats,… The post Innovator Spotlight: Expel appeared first on Cyber Defense…
Spotlight on Oleria
Q&A with OIeria CEO Jim Alkove: Identity is the keystone to the future of cybersecurity and a critical area for companies to focus on because it’s where attackers are moving…. The post Spotlight on Oleria appeared first on Cyber Defense…
Innovator Spotlight: Salt Security
In a world where APIs have become integral to the digital and technical experience, they also represent a significant security risk, often flying under the radar of traditional security solutions…. The post Innovator Spotlight: Salt Security appeared first on Cyber…
Innovator Spotlight: HUMAN
During my conversation with Lindsay Kaye, VP of Threat Intelligence at HUMAN Security, she emphasized how HUMAN tackles some of the most complex and overlooked threats in today’s digital landscape…. The post Innovator Spotlight: HUMAN appeared first on Cyber Defense…
Innovator Spotlight: Tanium
During my conversation with Melissa Bischoping, Senior Director of Security & Product Design Research at Tanium, she emphasized how the company addresses the critical challenge of operational risk and security… The post Innovator Spotlight: Tanium appeared first on Cyber Defense…
Innovator Spotlight: Keepnet Labs
Human error remains one of the most significant vulnerabilities in cybersecurity. Despite advances in technology and automated defenses, employees continue to be the primary target for cybercriminals, particularly through social… The post Innovator Spotlight: Keepnet Labs appeared first on Cyber…
Innovator Spotlight: Lineaje
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving the way of cybersecurity innovation. … The post Innovator Spotlight: Lineaje appeared first on Cyber Defense…
GDPR & CCPA: A CIO’s Essential Guide to Email Compliance
Imagine a world where your inbox isn’t a monster overflowing with junk. A world where you can be confident your emails are safe and secure. That’s the power of email… The post GDPR & CCPA: A CIO’s Essential Guide to…
AI in Cybersecurity: Understanding Challenges, Opportunities and New Approaches
Artificial intelligence (AI) has rapidly reshaped the cybersecurity landscape and simultaneously presents both exciting advancements while also introducing new challenges. As AI’s role in the tactics of both cyber attackers… The post AI in Cybersecurity: Understanding Challenges, Opportunities and New…
Cyber Threats vs. Risks: Building a Proactive Cyber Defense
As cybersecurity threats continue to evolve in the ever-changing cyber landscape, organizations within every industry must implement a comprehensive security strategy to remain resilient in the face of attacks. While… The post Cyber Threats vs. Risks: Building a Proactive Cyber…
Why Legacy MFA is DOA
Multi-Factor Authentication (MFA) has long been heralded as a cornerstone of secure digital practices. However, the traditional forms of MFA, now often referred to as “legacy MFA,” are increasingly seen… The post Why Legacy MFA is DOA appeared first on…
Best Practices for Enterprise Security
Cyberattacks and data breaches are running rampant in enterprises, causing havoc and interrupting business operations. These nuisances are the last thing an organization wants to experience and can cause long-lasting… The post Best Practices for Enterprise Security appeared first on…
Unlocking The Context Behind Bot Attacks: Protecting Your Go-To-Market Strategy
Safeguarding your enterprise’s data operations is more critical than ever. The rise of malicious bot attacks poses a particular threat, making it imperative that businesses develop a cybersecurity strategy that… The post Unlocking The Context Behind Bot Attacks: Protecting Your…
Innovator Spotlight: Cobalt
Pioneering Pentest as a Service (PtaaS) for Enhanced Offensive Security At BlackHat, we had the opportunity to speak with Jason Lamar, Cobalt’s Senior Vice President of Product, about the evolving… The post Innovator Spotlight: Cobalt appeared first on Cyber Defense…
Innovator Spotlight: BackBox
Revolutionizing Network Security Automation I recently spoke with Rekha Shenoy, CEO of BackBox during the BlackHat conference, and her insights into the tech industry and network security were nothing short… The post Innovator Spotlight: BackBox appeared first on Cyber Defense…
Innovator Spotlight: Delinea
Revolutionizing Identity Security with AI-Driven Solutions At BlackHat 2024, we had the pleasure of discussing the future of identity security with Phil Calvin, Chief Product Officer at Delinea. As organizations… The post Innovator Spotlight: Delinea appeared first on Cyber Defense…
Innovator Spotlight: Pentera
Revolutionizing Cybersecurity with Automated Security Validation In a conversation with Jay Mar-Tang, Field CISO at Pentera, it became clear that the landscape of cybersecurity is rapidly evolving. With the increasing… The post Innovator Spotlight: Pentera appeared first on Cyber Defense…
The Internet of Things Technological Perspective
The Internet of Things (IoT) is a boom which has come with the ongoing industrial progress and revolution offering something inexpensive and suitable to everyone, but yet quite unreliable and… The post The Internet of Things Technological Perspective appeared first…
The Evolution of Device Recognition to Attack Fraud at-Scale
Fraud prevention today is like a game of whack-a-mole. When one fraudster or attack method is stamped out, another arises to take its place. Similarly, when a fraud prevention solution… The post The Evolution of Device Recognition to Attack Fraud…
Black Basta Cybersecurity Advisory: Endpoint Protection for Healthcare
Recent studies have estimated that as many as 90% of successful cyberattacks and 70% of data breaches originate at the endpoint. This growing issue is especially impactful within healthcare systems nationwide…. The post Black Basta Cybersecurity Advisory: Endpoint Protection for Healthcare…
Making Progress and Losing Ground
As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The good news is that many people are now aware of… The post Making Progress and Losing Ground appeared first on…
Innovator Spotlight: SNYK
It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to figure out the best way to fix it without breaking… The post Innovator Spotlight: SNYK appeared first on Cyber Defense…
Publishers Spotlight: Blumira
I was thrilled to catch up with Blumira during Black Hat USA 2024. When it comes to resource-constrained businesses, traditional security information and event management (SIEM) systems can seem like… The post Publishers Spotlight: Blumira appeared first on Cyber Defense…
Innovator Spotlight: ThreatLocker
In the rapidly evolving world of cybersecurity, incidents frequently arise when malicious code finds its way into trusted environments. These breaches can be triggered by seemingly harmless actions, such as… The post Innovator Spotlight: ThreatLocker appeared first on Cyber Defense…
Spotlight on Sysdig
As cloud environments continue to expand, so do the threats targeting them. In today’s fast-paced digital world, attacks on cloud infrastructure happen within 10 minutes, leaving traditional security tools struggling… The post Spotlight on Sysdig appeared first on Cyber Defense…
Spotlight on Akto.ai
As APIs become the backbone of digital transformation, they also represent one of the biggest security risks to organizations. According to Gartner, by 2025, APIs will be the top attack… The post Spotlight on Akto.ai appeared first on Cyber Defense…
Innovator Spotlight: Beyond Identity
At Black Hat 2024, I had the opportunity to speak with Jasson Casey, CEO of Beyond Identity, about their groundbreaking work in secure identity and access management (IAM). In an… The post Innovator Spotlight: Beyond Identity appeared first on Cyber…
Innovator Spotlight: Zenity
Another innovative industry leader I had the pleasure of speaking with was Michael Bargury, Co-Founder and CTO of Zenity, a pioneering company that is redefining how enterprises approach security for… The post Innovator Spotlight: Zenity appeared first on Cyber Defense…
Innovator Spotlight: Traceable AI
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving the way for cybersecurity innovation…. The post Innovator Spotlight: Traceable AI appeared first on Cyber…
Innovator Spotlight: Reco.ai
As organizations increasingly rely on SaaS applications, the risk of data breaches and unauthorized access grows significantly. According to a 2024 study by the Ponemon Institute, 63% of data breaches… The post Innovator Spotlight: Reco.ai appeared first on Cyber Defense…
Strengthening Your Cybersecurity Insurance Posture with Privileged Access Management (PAM) Solutions
In an era where cyber threats loom larger than ever, businesses are increasingly relying on cyber insurance as a critical component of their risk management strategy. Indeed, the Netwrix 2024 Hybrid… The post Strengthening Your Cybersecurity Insurance Posture with Privileged Access…
Spotlight on Simbian
The race to adopt AI-driven solutions has opened up new opportunities for businesses but has also introduced unprecedented risks in data integrity, compliance, and governance. According to Gartner, 40% of… The post Spotlight on Simbian appeared first on Cyber Defense…
Innovator Spotlight: DNSFilter
In today’s digital age, cybersecurity can often feel like a daunting challenge, with the constant fear of being just one click away from a potential compromise. For Timothy (TK) Keanini,… The post Innovator Spotlight: DNSFilter appeared first on Cyber Defense…
Innovator Spotlight: Gurucul
It was a privilege to meet with Saryu Nayyar, CEO of Gurucul, a prominent woman leader in the cybersecurity industry. As a fellow woman in this field, I was particularly… The post Innovator Spotlight: Gurucul appeared first on Cyber Defense…
The End of the Tunnel Vision: Why Companies Are Ditching VPNs for Zero Trust
Virtual private networks (VPNs) have been the workhorse of secure remote access for decades. They offer a seemingly simple solution: they create a secure tunnel between a user’s device and… The post The End of the Tunnel Vision: Why Companies…
Innovator Spotlight: Cyversity
Interview with Dr. Wade Holmes, member, Cyversity Board of Directors Cyversity is a 501(c)(3) organization whose mission is to achieve the consistent representations of women, underrepresented minorities, and all veterans… The post Innovator Spotlight: Cyversity appeared first on Cyber Defense…
Encryption of Data at Rest: The Cybersecurity Last Line of Defense
Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of cybersecurity, where threats are becoming increasingly sophisticated and pervasive, traditional… The post Encryption of Data at Rest: The Cybersecurity Last…
Striking a Balance Between the Risks and Rewards of AI Tools
With all the recent hype, many may not realize artificial intelligence is nothing new. The idea of thinking machines was first introduced by Alan Turing in the 1950s, and the… The post Striking a Balance Between the Risks and Rewards…
Sheltering From the Cyberattack Storm – Part Two
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate against such an attack. But the cybersecurity storm doesn’t stop… The post Sheltering From the Cyberattack Storm – Part Two…
Strategizing Compliance and Security In AI: A Hands-On Guide for IT Leaders
Navigating the complex web of compliance in the AI era is a formidable challenge, and aligning your organization with existing and emerging legal, ethical, and regulatory standards has never been… The post Strategizing Compliance and Security In AI: A Hands-On…
Innovator Spotlight: ArmorCode
As the world of software development accelerates, the need to secure applications from the earliest stages of development has become critical. The rise of DevSecOps has placed immense pressure on… The post Innovator Spotlight: ArmorCode appeared first on Cyber Defense…
Cyber-Informed Engineering – A New Perspective on OT Security
Cyber-Informed Engineering (CIE) is a new perspective on OT cyber risk – one that is being embraced by OT/engineering teams and IT/enterprise cybersecurity teams alike. This kind of consensus among IT… The post Cyber-Informed Engineering – A New Perspective on OT…
Publisher’s Spotlight: Checkmarx
I was thrilled to catch up with Checkmarx during Black Hat USA 2024. Cloud development transformation has ushered in a host of expanding security challenges: the rising number of point… The post Publisher’s Spotlight: Checkmarx appeared first on Cyber Defense…
Innovator Spotlight: DataBee™
The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…
Publisher’s Spotlight: Horizon3.ai
I was thrilled to catch up with Horizon3.ai during Black Hat USA 2024. Most attackers don’t break in, they log in. CrowdStrike’s 2023 Global Threat Report findings confirm that 71%… The post Publisher’s Spotlight: Horizon3.ai appeared first on Cyber Defense…
Innovator Spotlight: DataBee™
The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…
Innovator Spotlight: Reach Security
Despite the increasing number of cybersecurity tools available, attacks continue to succeed at an alarming rate. Studies show that more than 70% of organizations only utilize 20% or less of… The post Innovator Spotlight: Reach Security appeared first on Cyber…
Innovator Spotlight: SecPod
Vulnerability management has become more critical than ever as the global cost of cybercrime is projected to reach $10.5 trillion annually by 2025. In a world where a cyberattack occurs… The post Innovator Spotlight: SecPod appeared first on Cyber Defense…
Innovator Spotlight: Cigent
As organizations increasingly rely on edge devices for data collection and processing, the risk of sensitive data breaches has escalated. The proliferation of traditional and emerging devices, such as IoT,… The post Innovator Spotlight: Cigent appeared first on Cyber Defense…
Innovator Spotlight: ExtraHop
As organizations face an escalating wave of cyberattacks, ransomware remains a top concern, with more than 91% of IT and security decision-makers admitting to having paid at least one ransom… The post Innovator Spotlight: ExtraHop appeared first on Cyber Defense…
Innovator Spotlight: Upwind
The rapid adoption of cloud technology has led to an explosion in complexity and vulnerability within modern infrastructures. In 2022, 45% of businesses reported cloud-based data breaches or failed audits,… The post Innovator Spotlight: Upwind appeared first on Cyber Defense…
Innovator Spotlight: Normalyze
In today’s fast-paced digital world, data breaches have become the norm, not the exception. With data sprawled across cloud, on-prem, and hybrid environments, organizations face critical challenges in maintaining visibility… The post Innovator Spotlight: Normalyze appeared first on Cyber Defense…
Innovator Spotlight: Harmonic Security
The rapid rise of generative AI (GenAI) has brought about both unprecedented opportunities and significant challenges for organizations, particularly in data protection. According to MIT research, 77% of organizations identify… The post Innovator Spotlight: Harmonic Security appeared first on Cyber…
Innovator Spotlight: AppSOC
The rapid adoption of AI and Generative AI applications has unlocked tremendous potential, but it has also introduced significant security risks that enterprises must address. Gartner predicts that by 2025,… The post Innovator Spotlight: AppSOC appeared first on Cyber Defense…
From Crisis to Catalyst: A CEO’s Lessons Learned from A Cybersecurity Incident
There are events in business and life that put everything else into perspective. Sometimes, these are moments of crisis, yet also moments of clarity; moments of shock, and moments of… The post From Crisis to Catalyst: A CEO’s Lessons Learned…
Publisher’s Spotlight: Cyera
I was thrilled to catch up with Cyera during Black Hat USA 2024. Over 90% of the world’s data was created in the last two years – making data the… The post Publisher’s Spotlight: Cyera appeared first on Cyber Defense…
Publisher’s Spotlight: Cranium
I was thrilled to catch up with Cranium during Black Hat USA 2024. CISOs are feeling pressure from their CEOs and Boards to support these initiatives when they need more… The post Publisher’s Spotlight: Cranium appeared first on Cyber Defense…
Publishers Spotlight: Cranium
I was thrilled to catch up with Cranium during Black Hat USA 2024. CISOs are feeling pressure from their CEOs and Boards to support these initiatives when they need more… The post Publishers Spotlight: Cranium appeared first on Cyber Defense…
Rethinking Cyber-Physical Systems Security in the Age of Industry 4.0
As manufacturing advances into the Industry 4.0 era, the integration of Information Technology (IT) and Operational Technology (OT) necessitates a comprehensive defense strategy tailored to the unique needs of industrial… The post Rethinking Cyber-Physical Systems Security in the Age of…
Publishers Spotlight: Bedrock Security
I was thrilled to catch up with Bedrock Security during Black Hat USA 2024. The surge in data volume from cloud and GenAI initiatives, coupled with escalating threats to enterprises’… The post Publishers Spotlight: Bedrock Security appeared first on Cyber…
The Hidden Threat of Shadow AI
In November 2022, ChatGPT launched, bringing new possibilities and challenges. As AI and GenAI have grown in popularity and use, businesses have had to grapple with how to use the… The post The Hidden Threat of Shadow AI appeared first…
Publishers Spotlight: ForAllSecure
I was thrilled to catch up with ForAllSecure during Black Hat USA 2024. ForAllSecure is an organization of hackers, developers, and security professionals dedicated to research and innovation in the… The post Publishers Spotlight: ForAllSecure appeared first on Cyber Defense…
Publishers Spotlight: Endari
I was thrilled to catch up with Endari during Black Hat USA 2024. Endari partners with startups and SMBs to enhance their cybersecurity maturity, integrating proactive security measures into their… The post Publishers Spotlight: Endari appeared first on Cyber Defense…
Your Company Culture Can Become A Powerful Cybersecurity Resource
If your organization doesn’t already make security a pillar of its culture, this could be the year to start. That’s because the cybersecurity landscape is changing, due to factors including… The post Your Company Culture Can Become A Powerful Cybersecurity…
All-in-One: How Cynet is Revolutionizing Cybersecurity for MSPs
Managed Services Providers (MSPs) are increasingly looking to provide cybersecurity services due to the demand from their current clients. Though the revenue potential is lucrative, the road for many MSPs… The post All-in-One: How Cynet is Revolutionizing Cybersecurity for MSPs…
Internal And External Threat Intelligence
How To Balance the Two Sources In cybersecurity, threat intelligence covers a broad range of activities concerning collection, analysis, and dissemination of information on the current threat landscape. In terms… The post Internal And External Threat Intelligence appeared first on…
Getting Wins for Security Leaders: Strategies and Considerations for Success
Navigating the Cybersecurity Landscape: Achieving Impactful Wins Through Data, Collaboration, and Continuous Improvement Do not think of advocating for critical security investments as a single battle, but a drawn-out campaign… The post Getting Wins for Security Leaders: Strategies and Considerations…
How To Respond to The Rise of Banking Trojans
The resurgence of banking trojans has become a major cybersecurity concern for financial institutions and their customers. These malicious backdoor programs continue to evolve and succeed due to their ability… The post How To Respond to The Rise of Banking…
Massive Data Breach at National Public Data Exposes 2.7 Billion Records
In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The… The post Massive Data Breach at National Public Data Exposes…
Addressing Cybersecurity Challenges in Healthcare: A Strategic Approach
As the healthcare sector becomes increasingly digital, it faces a growing threat from cybersecurity attacks. Recent years have seen a disturbing rise in data breaches, ransomware attacks, and other cyber… The post Addressing Cybersecurity Challenges in Healthcare: A Strategic Approach…
Publishers Spotlight: SquareX
I was thrilled to catch up with SquareX during Black Hat USA 2024. SquareX is a cybersecurity startup that specializes in enhancing browser security and privacy through innovative solutions. The… The post Publishers Spotlight: SquareX appeared first on Cyber Defense…
Publisher’s Spotlight: Syxsense
I was thrilled to catch up with Syxsense during Black Hat USA 2024. Syxsense is a cybersecurity company that provides unified endpoint management and security solutions. The company specializes in… The post Publisher’s Spotlight: Syxsense appeared first on Cyber Defense…
Choosing Security: Why Companies Should Reject Ransom Payments
With ransomware attacks reaching unprecedented levels, businesses face tough decisions when their data is held hostage. While the temptation to pay the ransom to recover data quickly is strong, this… The post Choosing Security: Why Companies Should Reject Ransom Payments…
Publishers Spotlight: F5
I was thrilled to catch up with F5 during Black Hat USA 2024. Years ago, when I started an innovative e-commerce company, we used their Big IP product to load… The post Publishers Spotlight: F5 appeared first on Cyber Defense…
Publishers Spotlight: Endace
Fundamental and Foundational to InfoSec and Regulatory Compliance is Capturing all Packets. Figure 1. Endace High-Performance Packet-capture Appliance Endace specializes in always-on, hybrid-cloud packet capture, addressing the challenge of ensuring… The post Publishers Spotlight: Endace appeared first on Cyber Defense…
Defense in Diversity: A Strategy for Robust Cybersecurity
The concept of “defense in depth” dates back to ancient times, epitomized by the ramparts, draw-bridge, towers, and battlements surrounding a medieval castle. Cybersecurity’s adaptation of the idea — multiple… The post Defense in Diversity: A Strategy for Robust Cybersecurity…
Lead with simplicity: A guide for strengthening security in logistics
Supply chains are the pulse of our global economy. When they falter, the effects can ripple through industries — impacting production lines, delivery schedules, company performance, and, ultimately, customer satisfaction…. The post Lead with simplicity: A guide for strengthening security…
Publishers Spotlight: DigitalXForce
When I go to BlackHat I’m always looking for cyber innovation across many vectors including cyber resilience artificial intelligence and most importantly compliance. This year I met up with Lalit… The post Publishers Spotlight: DigitalXForce appeared first on Cyber Defense…
Shedding Light on The Dark Web: Enhancing Cybersecurity Through Proactive Monitoring
In the digital age, the dark web has emerged as a clandestine marketplace for illicit activities, including the sale of stolen data, illegal software and various forms of malware. The proliferation of these marketplaces poses significant threats to personal, corporate and national security. As… The post Shedding Light on The Dark Web: Enhancing Cybersecurity…
Maximizing Cybersecurity Impact Within Budget Constraints
Cybersecurity is the cornerstone of organizational stability and resilience today. Despite its critical importance, budgetary allocations often fall short due to competing priorities. Mimecast recently surveyed 1,100 CISOs and information… The post Maximizing Cybersecurity Impact Within Budget Constraints appeared first…
The Undeniable but Often Overlooked Human Element of Cybersecurity
It is firmly established that there is no such thing as 100% security – in fact, a security breach is not a matter of ‘if’ but ‘when.’ In other words, risk will always exist, and businesses… The post The Undeniable but Often Overlooked Human Element of…
Transparency in Cybersecurity: The Importance of Accurate Vulnerability Disclosures
Recently, the cybersecurity world has been rattled by a series of critical vulnerabilities discovered in Ivanti Connect Secure VPN software. In the wake of these ongoing vulnerability issues, Ivanti has… The post Transparency in Cybersecurity: The Importance of Accurate Vulnerability…
Balancing the Scales: Addressing Privacy, Security, and Biases in AI based on the White House Blueprint for an AI Bill of Rights
Within the last few weeks, the major AI competitors OpenAI, Google, and Microsoft unveiled several new products and capabilities of their platforms. Perhaps, most notable was OpenAI’s ability to now… The post Balancing the Scales: Addressing Privacy, Security, and Biases…
The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter
I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My RSA 2024 started on Sunday, speaking with a group of… The post The Art of Possible: Redefining Cybersecurity in the…
Safeguarding The Backbone: The Critical Imperative to Protect Operational Technology (OT) Devices
Introduction Operational Technology (OT) devices, integral in controlling and monitoring industrial processes, have become prime targets for cyberattacks. Since late 2023, there has been a notable increase in attacks on… The post Safeguarding The Backbone: The Critical Imperative to Protect…
Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders
The Federal OT footprint – from military base operations to their public utilities, from postal operations to NASA missions – is immense, which means the potential cyber attack surface is… The post Who’s Minding the Store? Why Operational Technology Security…
The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth
Data security and consumer trust go hand-in-hand in our evolving digital world There’s no doubt that data is a catalyst of growth, forcing companies to increasingly rely on it to… The post The Value of Trust: How Companies Can Harness…
It Is Time for Smart Cyber Requirements for the Water Sector
Since 2021, the Biden Administration has been consistently talking about the limitations of a purely voluntary approach to cybersecurity for critical infrastructure, and the need for a strategic shift. Among… The post It Is Time for Smart Cyber Requirements for…
Looking Past DevOps: AI, ClickOps and Platform Engineering
About fifteen years ago, DevOps radically overhauled the world of software engineering. Previously, the development process had been defined by sometimes maddening delays, as development teams waited for operations teams… The post Looking Past DevOps: AI, ClickOps and Platform Engineering…
The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare
In an alarming revelation, Kaiser Foundation Health Plan reported a data breach impacting over 13 million individuals. For years, there has been an unspoken but critical vulnerability in the healthcare… The post The Kaiser Data Breach Should Be a Wake-Up…
How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert
It doesn’t take much to guess why cybercriminals increasingly target banking applications including emerging fintech and trading as their prime targets – cybercriminals have and continue to be largely financially-motivated…. The post How to Best Secure Banking Applications – Top…
Mitigating Data Breaches with AI-Driven Security Solutions
SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes, even those equipped with robust security measures. As cybercriminals become… The post Mitigating Data Breaches with AI-Driven Security Solutions appeared…
The Dual Nature of Ransomware Attacks
Financial Gain and Geopolitical Strategy Ransomware attacks have evolved from mere cybercriminal activities to sophisticated operations serving dual purposes: financial gain for attackers and advancing the geopolitical objectives of adversarial… The post The Dual Nature of Ransomware Attacks appeared first…
The Other Lesson from the XZ Utils Supply-Chain Attack
“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in the case of the recent XZ Utils case, it was… The post The Other Lesson from the XZ Utils Supply-Chain…