Category: Cyber Defense Magazine

The Threat of Privilege Abuse in Active Directory

In early 2024, the BlackCat ransomware attack against Change Healthcare caused massive disruption across the U.S. healthcare sector. It later emerged that the cause of this major national incident was… The post The Threat of Privilege Abuse in Active Directory…

Artificial Intelligence – Supported Internet of Things Security

Transforming digital technology landscape and encompassing global product and service marketplace are crucial challenges of industry 4.0. Novel times have brought something new such as Internet of Things (IoT) and… The post Artificial Intelligence – Supported Internet of Things Security…

The Future of Travel Technology

As technology continues to advance in society, everyday necessities are becoming more accessible by the day. Electronic passports are quickly becoming the answer to modernize travel security. With these new… The post The Future of Travel Technology appeared first on…

Deepfakes: The Cybersecurity Pandora’s Box

The meteoric rise of artificial intelligence (AI) has not only revolutionized industries but also unleashed a Pandora’s box of potential threats. Among the most insidious is the emergence of deepfakes,… The post Deepfakes: The Cybersecurity Pandora’s Box appeared first on…

Innovator Spotlight: Wallarm

The Digital Fortress: How APIs Are Reshaping Cybersecurity in the Age of AI Cybersecurity isn’t just about protecting networks. It’s about understanding the intricate digital highways that connect our most… The post Innovator Spotlight: Wallarm appeared first on Cyber Defense…

Why the Cybersecurity Talent Shortage is a Global Threat

In the era of digital transformation, where data flows across borders and devices, data security is paramount. Cyberattacks are no longer isolated incidents but global challenges that affect economies, industries,… The post Why the Cybersecurity Talent Shortage is a Global…

Countering The Adaptive Playbook of Modern Threat Actors

The cybersecurity landscape has seen a substantial threat vector transformation. While malware and ransomware continue to be relevant threats, a more nuanced class of attacks has gained traction. Over 80%… The post Countering The Adaptive Playbook of Modern Threat Actors…

Top Recommendations for Data Retention and Deletion

The tremendous value that data holds for organizations also comes with the responsibility to properly address its storage, governance, and security. How can businesses tackle this significant task? This article… The post Top Recommendations for Data Retention and Deletion appeared…