Category: Cyber Defense Magazine

Cyber Hygiene Protecting Your Digital and Financial Health

In an age where digital and financial risks are increasingly interconnected, cyber hygiene stands as a pillar of modern risk management, essential to preserving both operational resilience and financial credibility…. The post Cyber Hygiene Protecting Your Digital and Financial Health…

The 3 Hidden Dangers of Avoiding SOC 2 Compliance

As a business, do you think avoiding SOC 2 compliance saves time and money? Think again. With cybercrime damages being projected to cost the world $1.2 trillion annually by 2025, skipping… The post The 3 Hidden Dangers of Avoiding SOC 2…

Innovator Spotlight: Replica Cyber

Cybersecurity’s Dirty Little Secret: Reimagining Isolation – How Replica Cyber Empowers CISOs with Secure Environments in Seconds Imagine creating a completely secure, fully configured digital workspace in minutes instead of… The post Innovator Spotlight: Replica Cyber appeared first on Cyber…

Innovator Spotlight: Qualys

Demystifying Cyber Risk: How Qualys is Transforming Security Leadership Cybersecurity leadership is undergoing a profound transformation. No longer confined to technical silos, CISOs are becoming strategic partners who translate complex… The post Innovator Spotlight: Qualys appeared first on Cyber Defense…

TLDR* May Work for EULAs But Your Contracts?

Time is a luxury few of us can afford to waste. Decision-makers often find themselves sifting through mountains of information, juggling priorities, and racing against deadlines. This urgency has bred… The post TLDR* May Work for EULAs But Your Contracts?…

Trends in Ransomware Attacks in Q3, 2024

In the latest Q3 Ransomware Report from our team at Cyberint – a Check Point Software company and a leading voice in external cyber-risk management – we’ve placed particular emphasis… The post Trends in Ransomware Attacks in Q3, 2024 appeared…

Why CISOs Need an AI-Native Strategy

The CEO of Nokia, on the eve of being purchased by Microsoft, said “we didn’t do anything wrong but somehow, we lost.” These words describe the reality businesses face: embrace… The post Why CISOs Need an AI-Native Strategy appeared first…

Innovator Spotlight: ESET

Cybersecurity’s Enduring Guardians: ESET’s 35-Year Journey of Threat Intelligence The Berlin Wall crumbled, and from its digital shadows emerged a cybersecurity pioneer that would redefine threat protection for generations. ESET… The post Innovator Spotlight: ESET appeared first on Cyber Defense…

The Rise of Identity Risk Intelligence

For many years, cybersecurity professionals have relied on Indicators of Compromise (IOCs) such as IP addresses, domain names, and file hashes to defend against a number of cyber threats. While… The post The Rise of Identity Risk Intelligence appeared first…

Publisher’s Spotlight: NAKIVO Backup & Replication v11

A Powerful, All-in-One Solution for Cyber-Resilient Backup and Recovery In an era where ransomware, cloud complexity, and regulatory pressures are reshaping data protection priorities, NAKIVO Backup & Replication v11 provides… The post Publisher’s Spotlight: NAKIVO Backup & Replication v11 appeared…

Ongoing Money Laundering Insights

Abstract Money laundering is a major financial crime that involves introducing illicitly obtained funds into legitimate financial systems to disguise their criminal origins. Beyond concealing criminal activity, laundered funds are… The post Ongoing Money Laundering Insights appeared first on Cyber…

The Impact of Quantum Decryption

Executive Summary Quantum computing’s rapid progress poses a significant threat, potentially rendering current encryption methods and nearly all encrypted data vulnerable. This includes sensitive data that has already been stolen… The post The Impact of Quantum Decryption appeared first on…

The Growing Threat of AI-powered Cyberattacks in 2025

Data breach costs are rising at breakneck speed. IBM reported that the global average security breach cost is $4.9 million, marking a 10% increase since 2024. And it won’t stop here… The post The Growing Threat of AI-powered Cyberattacks in 2025…

Securing the Connected Factory Floor

As manufacturers strive to keep pace with changing demands and quickly evolving technologies, many are embracing digitalization and increased connectivity between information technology (IT) and operational technology (OT) environments. The… The post Securing the Connected Factory Floor appeared first on…

On Constant Community Improvements

The theme of this year’s RSAC is “Many Voices. One Community.” While our field can rightly claim “many voices”, portraying it as a “community” is a bit of a stretch…. The post On Constant Community Improvements appeared first on Cyber…

Implementing Effective AI Guardrails: A Cybersecurity Framework

As organizations race to implement AI solutions, security leaders face the challenge of enabling progress while protecting sensitive data. Grand Canyon Education (GCE), which serves 22 university partners, recently confronted this… The post Implementing Effective AI Guardrails: A Cybersecurity Framework appeared…

Key Cybersecurity Considerations for 2025

As we usher in a new year, it’s crucial to focus on key areas in cybersecurity that demand our attention. While there’s undoubtedly a long list of issues that all… The post Key Cybersecurity Considerations for 2025 appeared first on…

Make the Most of Your Holiday Cybersecurity Awareness Efforts

The holiday season is a time for joy, celebration, and, unfortunately, an uptick in cyber threats. From phishing scams that mimic festive deals to exploitation of end-of-year operational freezes, cybercriminals… The post Make the Most of Your Holiday Cybersecurity Awareness…

Now Is Not the Time to Cut Back on Security Teams

Generative artificial intelligence (AI) is revolutionising the way businesses operate. The widespread adoption and integration of models, such as OpenAI’s ChatGPT and Google’s Gemini, into everyday organisational processes has resulted… The post Now Is Not the Time to Cut Back…

Innovator Spotlight: LatticaAI

Lattica’s Mission: Making Private AI a Reality with the Power of Fully Homomorphic Encryption In the buzz-heavy world of AI and cybersecurity, it’s not every day a company steps out… The post Innovator Spotlight: LatticaAI appeared first on Cyber Defense…

The Story of Jericho Security

Redefining Cybersecurity for the AI Era With the launch of ChatGPT, everything changed – overnight, AI became democratized. But while everyday users turned to AI for grocery lists and grammar… The post The Story of Jericho Security appeared first on…

The Internet of Things Design Challenges

Developing an engineering project is a challenge by itself. In the practice, dealing with some product or service is very requiring and it can take a couple of phases from… The post The Internet of Things Design Challenges appeared first…

AI-powered Vishing

First, there was phishing. The goal: To trick targets into revealing information or completing unauthorized actions. Around since the 1990s, this attack vector remains the top internet crime reported to the… The post AI-powered Vishing appeared first on Cyber Defense Magazine.…

The Significance of Cybersecurity within AI Governance

In everyday life, AI integration rapidly changes traditional consumers’ shopping experiences, changes work scenarios at work spots, and health provision. With the impacts that AI strikes to the world, many… The post The Significance of Cybersecurity within AI Governance appeared…

The Evolution of SOC: Harnessing Data, AI and Automation

The modern Security Operations Center (SOC) faces an ever-growing tide of data, fueled by the explosion of connected devices, cloud migration, and increasingly sophisticated cyberattacks while the growing impact of… The post The Evolution of SOC: Harnessing Data, AI and…

Multi-channel Secure Communication

1.1 Emerging Cybersecurity Technologies As we move into 2025, AI and machine learning are expected to play an even larger role in cybersecurity. These technologies will be used to enhance… The post Multi-channel Secure Communication appeared first on Cyber Defense…

Cyber Risks Associated with Adoption of Generative AI Tools

As artificial intelligence (AI) continues to revolutionize the business landscape, midsized organizations find themselves at a crossroads, balancing the transformative potential of AI against the heightened risks it introduces. While… The post Cyber Risks Associated with Adoption of Generative AI…

Publisher’s Spotlight: Veriti

By Gary S. Miliefsky, Publisher, Cyber Defense Magazine Transforming Exposure Management with Safe, Automated Remediation Organizations today invest heavily in security tools, often spending $100k or more annually. But the… The post Publisher’s Spotlight: Veriti appeared first on Cyber Defense…

BREAKING: CISA Steps In to Keep CVE Services Alive

By Gary Miliefsky, Publisher, Cyber Defense Magazine Good news comes to us like a Windows patch Tuesday: Common Vulnerabilities and Exposures Program will continue operating with an eleven month continuation… The post BREAKING: CISA Steps In to Keep CVE Services…

MITRE CVE Program in Jeopardy

As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will expire on April 16,… The post MITRE CVE Program in Jeopardy appeared first on…

Publisher’s Spotlight: Industrial Defender

By Gary S. Miliefsky, Publisher, Cyber Defense Magazine In today’s hyperconnected world, protecting critical infrastructure has become a national imperative. From energy grids and transportation systems to water treatment facilities… The post Publisher’s Spotlight: Industrial Defender appeared first on Cyber…

Unified Endpoint Management: One Tool to Rule All

As the number of endpoint devices increases, managing and securing them becomes complex. The traditional way of using separate security tools for desktops, mobile devices, tablets, and other endpoints is… The post Unified Endpoint Management: One Tool to Rule All…

Training Skillset Transfer

Understanding Skills and Their Importance A skill is an individual’s ability to perform an action efficiently and effectively, providing a significant advantage in problem-solving. Skills go beyond mere knowledge, requiring:… The post Training Skillset Transfer appeared first on Cyber Defense…

The Invisible Fingerprint in Code

Digital Traces in Code Every program contains characteristic patterns of its developers, starting with the choice of variable names and preferred programming paradigms. Some developers rely on iterative solutions using… The post The Invisible Fingerprint in Code appeared first on…

Smart Meter Security: Best Practices and Emerging Regulations

Smart meters are essential to smart grids, empowering utilities and smart grid managers to provide consumers and energy providers with real-time energy consumption data, transparent billing, and demand side management…. The post Smart Meter Security: Best Practices and Emerging Regulations…

Digital Payment Security: Trends and Realities of 2025

As we navigate 2025, the digital transformation continues to reshape industries, with the financial sector  at its forefront. Digital payments are no longer an emerging trend, but a fundamental part… The post Digital Payment Security: Trends and Realities of 2025…

How Will the Splinternet Impact Cybersecurity

Most people think of the internet as a globally connected resource. However, user experiences are not necessarily as consistent as they believe. Factors such as politics, regulations and censorship have… The post How Will the Splinternet Impact Cybersecurity appeared first…

Effective Cyber Drills Must Mirror the Realities of The Battlefield

Over the past 15 years, cyberattacks have escalated dramatically. What began as isolated data breaches has evolved into sophisticated operations targeting critical infrastructure and serving intelligence-gathering objectives. The turning point… The post Effective Cyber Drills Must Mirror the Realities of…

Cybersecurity Trends for 2025

Artificial Intelligence (AI) has been the buzzword in cybersecurity and business for a few years now, and it will continue to impact security and all phases of business in 2025…. The post Cybersecurity Trends for 2025 appeared first on Cyber…

The CMMC Compliance Journey

The Cybersecurity Maturity Model Certification (CMMC) is a cybersecurity framework designed to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) within the defense supply chain. Still, it is… The post The CMMC Compliance Journey appeared first on Cyber…

What VirusTotal Missed — Discover with Unknown Cyber

“VirusTotal gives you opinions. Hybrid Analysis gives you behavior. Unknown Cyber gives you the truth in the code—before the malware even runs. That’s how we blow them both away.” —… The post What VirusTotal Missed — Discover with Unknown Cyber…

Rethinking SAP Security Without Maintenance Contracts

Do you rely on SAP maintenance contracts to keep vulnerabilities in check? Here’s a question: have you felt the sting of renewal season? Those spiraling costs are hard to ignore—just… The post Rethinking SAP Security Without Maintenance Contracts appeared first…

Unpacking Disinformation in the 2024 US Presidential Election

The 2016 U.S. presidential election is often cited as a watershed moment for digital disinformation campaigns – revealing the vulnerability of democratic processes to foreign interference and the spread of… The post Unpacking Disinformation in the 2024 US Presidential Election…

Key Cybersecurity Themes for 2025

Cyber threats are evolving faster than ever, and security leaders can’t afford to fall behind. That’s why we created the 2025 Fortra State of Cybersecurity Survey—to provide valuable insights that help SOCs,… The post Key Cybersecurity Themes for 2025 appeared first on…