Tag: Cyber Defense Magazine

An Interview with Greg Van Der Gaast

By Megan Lupton, Senior Content Executive, Champions Speakers From one of the most wanted hackers to being featured in the Top Trending Ethical Hackers list, Greg van der Gaast has […] The post An Interview with Greg Van Der Gaast…

What are NIST Encryption Standards? Why Do They Matter a Lot?

By Amar Basic, Co-Founder CyberArrow Data encryption is essential in today’s technologically advanced world to safeguard sensitive information against hacker assaults and data breaches, as an estimated 30,000 websites are […] The post What are NIST Encryption Standards? Why Do…

Empowered Encryption

Why organizations must take back control of their data By Dimitri Nemirovsky, Co-Founder & COO, Atakama Sometimes, what a change represents is more meaningful than the change itself. Case in […] The post Empowered Encryption appeared first on Cyber Defense…

Investing Wisely

Where to focus spend during the economic downturn By Tim Wallen, Regional Director, UK, US & Emerging Markets, Logpoint There remains a great deal of uncertainty when it comes to […] The post Investing Wisely appeared first on Cyber Defense…

Online Privacy Statistics

By Milos Djordjevic, Online Privacy Expert, VPN Central Online privacy is a burning issue in our modern threat landscape. It concerns both companies and individuals — no one can afford […] The post Online Privacy Statistics appeared first on Cyber…

From AI-driven Defense to Dark Web Threat Intelligence

How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […] The post From AI-driven Defense to Dark Web Threat…

Protecting Sensitive Information Within Translation

Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO, Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as financial […] The post Protecting Sensitive Information Within Translation appeared first…

Now is the Time for the Thoughtful Regulation of Crypto

By Hugh Brooks, Director of Security Operations, CertiK The rapid expansion of the cryptocurrency industry has brought technological innovation and financial inclusion, while promising a freer and fairer global financial […] The post Now is the Time for the Thoughtful…

Navigating Your Way to Resiliency in Four Steps

By Shane Steiger, Principal Cybersecurity Engineer, MITRE Cyber resiliency. The concept has been around for many years. No doubt you’ve seen the images, such as a tiny flower emerging among […] The post Navigating Your Way to Resiliency in Four…

5 Benefits Of SIEM To The Cybersecurity Of Any Business

By Aaron Haynes, a Columnist at Loganix.com Cybersecurity is a top priority for many businesses today because of the significant threats they face from hackers and cybercriminals. Companies now deal […] The post 5 Benefits Of SIEM To The Cybersecurity…

Communicating Cyber Risk

CISOs struggle with the board amidst an economic downturn. By Tim Fleming, Strategic Advisor, Silverfort Cyber risk is now nailed firmly to the board table. A seemingly never-ending procession of […] The post Communicating Cyber Risk appeared first on Cyber…

Is ChatGPT Ready to Disrupt Cybersecurity?

By Anurag Gurtu, Co-Founder & CPO, StrikeReady We’ve seen so many advancements in artificial intelligence within just a few years. ChatGPT is definitely one of the most recent ones – […] The post Is ChatGPT Ready to Disrupt Cybersecurity? appeared…

Evolution of the CISO Role

By Jaye Tillson, Director of Strategy, Axis Security Evolution of the CISO Role The Chief Information Security Officer (CISO) role is relatively new in the corporate world, with its origins […] The post Evolution of the CISO Role appeared first…

Closing The Cyber Marketing Gap with Investors

Positioning security as a stakeholder value proposition By Patrick Kehoe, Chief Marketing Officer at Coalfire With breaches and shutdowns making daily headlines, no one wants to do business anymore with […] The post Closing The Cyber Marketing Gap with Investors…

The Data Dilemma: Balancing Business Growth and Security

By Noah Johnson, Co-Founder & CTO of Dasera In today’s digital age, data is the lifeblood of business growth. With large amounts of data sprawled across multiple platforms, companies must […] The post The Data Dilemma: Balancing Business Growth and…

Considering All Returns on a Cybersecurity Compliance Program

By Doug Barbin, Chief Growth Officer and Managing Principal at Schellman C-Suite executives have many variables to consider when they are implementing changes or making investments at an enterprise level. […] The post Considering All Returns on a Cybersecurity Compliance…

Risk: Everything Everywhere All at Once

It’s Time to Get Proactive About Risk Reduction By Marc Gaffan, CEO of IONIX The first quarter of 2023 is being dominated by a singular theme, re-thinking risk. We came […] The post Risk: Everything Everywhere All at Once appeared…

Ransomware Takes No Prisoners

By Monica Oravcova, COO and Co-Founder of Naoris Protocol The recent Killnet cyberattack that disrupted contact between NATO and military aircraft providing aid to victims of the Turkish-Syrian earthquake, is […] The post Ransomware Takes No Prisoners appeared first on…

Protecting Accounting Firms from Cyberattacks

Cybersecurity Practices Must Be A Top Priority For Firms This Busy Season By Alan Hartwell, Chief Technology Officer at IRIS Software Group Financial service firms are a top target for […] The post Protecting Accounting Firms from Cyberattacks appeared first…

New Cyber Threats Calls for New Approaches

By Mark Sincevich, Federal Director of Illumio Data compromises hit record numbers in 2021 with 1,826 occurrences reported, up 23 percent from 2017. In the last two years alone, 66 […] The post New Cyber Threats Calls for New Approaches…

Stop Backing Up Ransomware

By James Gorman, Cyber Security Expert and Entrepreneur When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for the cloud environment. However, having […] The post Stop Backing Up Ransomware appeared first on…

Understanding The Concept of Privacy By Design

By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and Privacy Commissioner Ann Cavoukian, is a comprehensive approach to privacy […] The post Understanding The Concept of Privacy By Design…

Cyberattacks on City and Municipal Governments

Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago.  The increase in breaches is likely due to several factors, including the […] The post Cyberattacks on City and Municipal Governments appeared…

Cyber Attack as an Asymmetric Threat

By Milica D. Djekic, Independent Researcher Abstract: Cyberspace is yet unsafe environment for communication and data transfer. Hacker’s organizations can target many servers, datacenters and endpoints relying on capacities of […] The post Cyber Attack as an Asymmetric Threat appeared…

Collaboration is Key to Building Industrial Cyber Resilience

By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis Specialist at the World Economic Forum`s Centre for Cybersecurity Industries […] The post Collaboration is Key to Building Industrial Cyber…

SAP Debugger’s Power and Danger

By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar where the Service Advertising Protocol (“SAP”) representative explained a recently […] The post SAP Debugger’s Power and Danger appeared first…

Strengths and Vulnerabilities of AI Applications to Health Care

By Edward Maule, Chief Information Officer and Chief Information Security Officer at Advocare, LLC Artificial intelligence (AI) has made significant advancements in the healthcare sector, and its potential is almost […] The post Strengths and Vulnerabilities of AI Applications to…

2023 Predictions

By Anurag Gurtu, Chief Product Officer at Strike Ready In 2022, the global average total breach cost surpassed $4.35M, and nearly two-thirds of organizations experienced more than one breach. As […] The post 2023 Predictions appeared first on Cyber Defense…

ChatGPT and You

Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer at Sangfor Technologies Okay, I admit the title is clickbait to get you to read this article. […] The post ChatGPT and You appeared first on Cyber…

Security Tool Integration Isn’t Enough Anymore

By Manoj Arora, Founder & CEO, Difenda Organizations today are overwhelmed with options when it comes to security tools and technologies. In the past, best-of-breed security technology meant having the […] The post Security Tool Integration Isn’t Enough Anymore appeared…

Complexity is Still the Enemy of Security

Ease of Use, Ease of Integration Encourages Data Protection By Gregory Hoffer, CEO of Coviant Software In 1999 noted cybersecurity expert Bruce Schneier wrote in his Schneier on Security blog […] The post Complexity is Still the Enemy of Security…

How to Improve your Security Posture and ROI

By Mark Evans, VP Marketing and Packet Capture Evangelist at Endace Let’s assume your security team has completed all the “low-hanging fruit” security essentials. They’ve made sure all the basic […] The post How to Improve your Security Posture and…

ImmuniWeb AI Platform

Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […] The post ImmuniWeb AI Platform appeared first on Cyber…

OT Zero Trust

The Last Frontier to Protect OT Environments By Terence Liu, CEO, TXOne Networks OT Zero Trust – a Device-Centric Methodology In the IT world, the heart of Zero Trust is […] The post OT Zero Trust appeared first on Cyber…

2023: What Awaits Us?

By Ashley Stephenson, CTO, Corero Network Security When it comes to cyber security, one thing that 2022 and just about any recent year will be remembered for is the succession […] The post 2023: What Awaits Us? appeared first on…

ChatGPT and You

Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer, Sangfor Technologies Okay, I admit the title is clickbait to get you to read this article. There […] The post ChatGPT and You appeared first on Cyber…

A Question of Doubt

The cyber security crisis of confidence amongst CISOs and CIOs — and how to overcome it. By Gary Penolver, Chief Technology Officer at Quod Orbis I’ve worked closely with CISOs […] The post A Question of Doubt appeared first on…

Eight Tips for CISOs Trying Get Their Board on Board

By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role in strategic decision-making in enterprises. Yet CISOs frequently find themselves […] The post Eight Tips for CISOs Trying Get Their…

Zero Trust in a DevOps World

By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical to securing people, devices, infrastructure, and applications – all of […] The post Zero Trust in a DevOps World appeared…

Solving The AppSec Dilemma Across the Entire SDLC

Why organizations should adopt an integrated and continuous approach to application security education By Amy Baker, Security Education Evangelist, Security Journey The software supply chain is under increasing threat. With […] The post Solving The AppSec Dilemma Across the Entire…

Securing Collaboration at the Speed of Business

By Ofer Klein, CEO and co-founder, Reco Recent research found that 96% of business leaders believe that effective communication is key to a productive remote or hybrid work. And Slack […] The post Securing Collaboration at the Speed of Business…

Sell tickets to Fans, Not to Bots.

By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase a ticket for an event only to discover they are […] The post Sell tickets to Fans, Not to Bots.…

Product Review of SpecOps Password Policy

Looking for a tool to validate if your Active Directory (AD) passwords are safe across your Enterprise? Why would this be important? There are a few solutions in the industry […] The post Product Review of SpecOps Password Policy appeared…

Lessons From the Uber Hack

By Tomasz Kowalski, CEO and Co-Founder, Secfense For decades, cybersecurity experts have been warning us against weak or stolen passwords. Two-factor authentication (2FA) has always been pointed out as the […] The post Lessons From the Uber Hack appeared first…

Our Nation Needs Comprehensive AI Legislation, And Soon

By Dr. Allen Badeau, Chief Technology Officer, Empower AI The White House recently launched an “AI Bill of Rights” framework to lay the groundwork for the future creation and use […] The post Our Nation Needs Comprehensive AI Legislation, And…