Tag: Cyber Defense Magazine

A New Ai Arms Race

By Alex Fink, CEO of the Otherweb The internet has seen its share of arms races in recent decades. The advent of viruses resulted in an ongoing battle between those […] The post A New Ai Arms Race appeared first…

6 Steps to Accelerate Cybersecurity Incident Response

Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must […] The post 6 Steps to Accelerate Cybersecurity Incident Response…

8 Tips for Best Results in Red-Teaming

By Zac Amos, Features Editor, ReHack In cybersecurity, a red team exercise is a unique way to ensure businesses can respond to cyberattacks appropriately. While it’s generally beneficial, taking extra […] The post 8 Tips for Best Results in Red-Teaming…

Simplifying your Approach to the Zero Trust Journey

By Chris Cullerot, Director of Technology and Innovation, iTech AG Earlier this year, the Cybersecurity and Infrastructure Security Agency released its Zero Trust Maturity Model 2.0 to help agencies develop […] The post Simplifying your Approach to the Zero Trust…

Digital Accessibility and Cybersecurity Must Go Hand in Hand

By Dr. Chris Olson In an Increasingly Digital World, Accessibility and Cybersecurity Have Emerged as Significant Factors for Both Individuals and Organizations. Digital accessibility refers to the design and development […] The post Digital Accessibility and Cybersecurity Must Go Hand…

Six Tips to Ensure a Strong Patch Management Strategy

By Ashley Leonard, CEO and Founder, Syxsense The proliferation of software applications and updates across the market today has put pressure on enterprise security teams to implement strong patch management […] The post Six Tips to Ensure a Strong Patch…

Publishers Spotlight: Nisos: Your Managed Intelligence Partner

Nisos is the Managed Intelligence™ team you need to consider working with to solve your most complex security challenges. They deliver smarter defense and more effective responses against advanced cyber […] The post Publishers Spotlight: Nisos: Your Managed Intelligence Partner…

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the […] The post How to interpret the 2023 MITRE ATT&CK…

Publisher’s Spotlight: F5: Multi-Cloud Security and Application Delivery

F5 is a multi-cloud application services and security company committed to bringing a better digital world to life.​​​​​​​ F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations […] The post Publisher’s Spotlight: F5: Multi-Cloud Security and Application…

Has MFA Had Its Day?

By Ori Arbel, CTO, CYREBRO Multi-factor authentication (MFA) has become the authentication standard for nearly all types of businesses – from banks to bicycle rentals and everything in between. Yet, […] The post Has MFA Had Its Day? appeared first…

From AI-driven Defense to Dark Web Threat Intelligence

How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […] The post From AI-driven Defense to Dark Web Threat…

Cyber: Dealing with a Data Breach

Data breaches are one of the most significant cyber threats organizations face, but when they occur, many businesses do not respond in a manner that reassures their clients or the […] The post Cyber: Dealing with a Data Breach appeared…

AI In Cybersecurity – Risks and Rewards

By Aimei Wei, Co-Founder and CTO, Stellar Cyber The global cybersecurity workforce grew to a record 4.7 million people in 2022, according to an (ISC)2 2022 workforce study, but the  same […] The post AI In Cybersecurity – Risks and Rewards…

The Best of Both Worlds Made Possible with A Hybrid SOC

By Chase Richardson, Principal Lead Consultant, Bridewell The revolving door of cyber-attacks on major organizations continues to turn. Among the most significant of breaches over the last year was a […] The post The Best of Both Worlds Made Possible…

The Role of AI in Cybersecurity

By Alysia Silberg, CEO, Street Global As technology increasingly connects us, people, businesses, and governments are more concerned with Cybersecurity than ever before. The development of Artificial Intelligence (AI) provides […] The post The Role of AI in Cybersecurity appeared…

Publisher’s Spotlight: Security Journey: Secure Coding Training

Security Journey is a secure coding education provider that is focused on addressing the evolving landscape of cybersecurity threats with comprehensive and engaging training. As security awareness has become a […] The post Publisher’s Spotlight: Security Journey: Secure Coding Training…

Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection

CrowdSec is a modern, collaborative cybersecurity company committed to proactively safeguarding digital assets. With a growing community of 65,000+ active installations contributing to a robust, constantly-updated global IP reputation database […] The post Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection…

The Other Russian War – What Can We Do?

Russian hacking efforts have highlighted weaknesses in U.S. cybersecurity infrastructure. By Jamie Eiseman, George Washington University Russia is invading Ukraine, and Russian hackers are attacking the United States. In October, […] The post The Other Russian War – What Can…

Publisher’s Spotlight: Cigent: Make Your Data Invisible

Cigent Technologies is a data security company that is renowned for their data protection  capabilities. They’ve had a long-standing relationship with the U.S. government and have been a trusted resource […] The post Publisher’s Spotlight: Cigent: Make Your Data Invisible…

Our Risk Perception Is Broken How Do We Fix It?

By Miguel Clarke, GRC and Cybersecurity Lead at Armor and former FBI Special Agent I was first introduced to the concept of cyber security in 2000.  Back then, the Dallas […] The post Our Risk Perception Is Broken How Do…

Protecting Sensitive Information Within Translation

Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO of Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as […] The post Protecting Sensitive Information Within Translation appeared first…

Measuring the Effectivity of Security with Data Analysis

By Howie Robleza, Freelance Writer, Avigilon Effective security strategies are fundamental to the success of any business with both physical and cyber security of equal importance. Businesses, even with the […] The post Measuring the Effectivity of Security with Data…

Implement Machine Learning to Secure Your IoT Network

By Zac Amos, Features Editor, ReHack Connected devices pose unique security risks and are prone to bot attacks, requiring a tool capable of quickly processing a large amount of information. […] The post Implement Machine Learning to Secure Your IoT…

Hybrid Mesh Firewall Management

By Ulrica de Fort-Menares, VP of Product & Strategy, Indeni What is Hybrid Mesh Firewall? With the rise of hybrid workforces and cloud networks, there is growing demand to secure […] The post Hybrid Mesh Firewall Management appeared first on…

How We Grew Revenue by Strengthening Cybersecurity

Make your security strategy good for business. By David Weisong, CIO at Energy Solutions Utility companies are, like just about all industries, increasingly concerned about cybersecurity—and for good reason. A […] The post How We Grew Revenue by Strengthening Cybersecurity…

Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection

Did you know that only 4% of CISOs have real-time visibility into runtime vulnerabilities in containerized production environments (https://www.dynatrace.com/news/blog/runtime-vulnerability-management-still-vexing-organizations/)?  According to Gartner, by 2025, over 75 percent of organizations will […] The post Publisher’s Spotlight: THREATX – A Cloud-Native Solution…

Five Tips to Securing Your Organization Through Your People.

By Dr. Inka Karppinen, CPsychol. Lead Behavioural Scientist, CybSafe While many commentators continue to tout technological solutions to various cyber security issues, with high-profile cyber-attacks and data breaches continuing to […] The post Five Tips to Securing Your Organization Through…

From Passwords to Passkeys – A Passing of the Torch

The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those without a password manager to keep track, that’s a prompt […] The post From Passwords to Passkeys – A Passing…

Don’t Jump to Conclusions on Zero Trust Adoption

By John Linford, Forum Director, The Open Group Security Forum, and Open Trusted Technology Forum The Open Group Security & Open Trusted Technology (OTTF) Even in an industry known for […] The post Don’t Jump to Conclusions on Zero Trust…

Controlling Cybersecurity Risks

Controlling Cyber Risks and Fraud by Risk Assessment By Hakan Kantas, Senior IT Director We are trying to protect all the Internet connected systems, users, network and other related structures […] The post Controlling Cybersecurity Risks appeared first on Cyber…

What Will Cybersecurity Jobs Look Like in 2028?

By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies What Will Cybersecurity Jobs Look Like in 2028? Macroeconomic turmoil, the Great Resignation, and layoffs by all-star companies – […] The post What Will Cybersecurity Jobs Look Like in…

Heard At RSAC 2023 – Protecting the Protectors

Some Personal Risks to Individual Cybersecurity Practitioners Are Elevated Because Of The Work They Do. Is It Time for Workplace Cyber Protections to Follow Them Home? By Chris Needs, VP […] The post Heard At RSAC 2023 – Protecting the…

HEAT Attacks Vs Apts – What Is the Difference?

By Mark Guntrip, Senior Director of Cybersecurity Strategy, Menlo Security A new breed of attacker has emerged, one that has learned to weaponize the web browser. The Highly Evasive Adaptive Threats […] The post HEAT Attacks Vs Apts – What Is…

7 Benefits of Implementing ZTNA

(Zero Trust Network Access) By Howie Robleza, Freelance Writer, Avigilon One of the most significant worries for business leaders in the current climate is the potential for an internal security […] The post 7 Benefits of Implementing ZTNA appeared first…

Biometric as a Service (BaaS) – An Opinion Piece

By Mohit Shrivastava, Chief Analyst ICT, Future Market Insights Biometric as a service (BaaS) works best as a striking alternative to other outmoded biometric software models. It becomes easy for […] The post Biometric as a Service (BaaS) – An…

The Next Evolution of Devsecops For The Defense Department

By Jonas Lazo, Vice President of Digital Engineering, Sev1Tech The White House recently proposed an $842 billion budget for the Department of Defense (DOD) for 2024, emphasizing the Administration’s commitment […] The post The Next Evolution of Devsecops For The…

An Interview with Sarah Armstrong-Smith

By Megan Lupton, Senior Content Executive, Champions Speakers Sarah Armstrong-Smith is a globally revered voice in the cyberspace. She is regularly booked for corporate conference and as a Cyber Security […] The post An Interview with Sarah Armstrong-Smith appeared first…

Securing Communications for Operational Military Success

By Nicole Allen, Senior Marketing Executive at Salt Communications. The significance in having Secure Communications for Military Operations. Thanks to expertly planned operational communications, military duties can be carried out […] The post Securing Communications for Operational Military Success appeared…

Operationalizing Zero Trust Architecture

By Chaim Mazal, Chief Security Officer, Gigamon Over the last few years, organizations have been hearing about a Zero Trust architecture (ZTA) as a means for IT leaders to take a […] The post Operationalizing Zero Trust Architecture appeared first on…

How Should CMMC Impact Your Remote Work Policies?

By Zac Amos, Features Editor, ReHack Cybersecurity Maturity Model Certification (CMMC) is another compliance framework defense industrial base (DIB) contractors can add to their toolkits to work for the Department […] The post How Should CMMC Impact Your Remote Work…

How Professional Human Hackers Choose Their Targets

By Peter Warmka, Founder, Counterintelligence Institute Over the past few years, Cybersecurity professionals have acknowledged the increasing need of security awareness training to combat the growing threat from social engineering. […] The post How Professional Human Hackers Choose Their Targets…

Hacks And Data Leaks

How to protect businesses from cyberattacks By Sergey Ozhegov, CEO, SearchInform Hacks and data leaks: how to protect businesses from cyberattacks Hardly a week goes by without a hack or […] The post Hacks And Data Leaks appeared first on…