Category: Cyber Defense Magazine

Detect and Destroy Cyber Threats with Red Piranha

By Adam Bennett, CEO, Red Piranha Red Piranha is Australia’s leading cybersecurity technology and solutions developer, manufacturer, and official member of Team Defence Australia for advanced cybersecurity solutions. Dedicated to […] The post Detect and Destroy Cyber Threats with Red…

Organizational Cybersecurity Hinges on End-User Satisfaction

The critical role end-user experience plays in organizational security By Amitabh Sinha, CEO and Co-Founder of Workspot In an era of sophisticated cyber-attacks, security leaders are feeling the pressure to […] The post Organizational Cybersecurity Hinges on End-User Satisfaction appeared…

Identity Management Challenges

By Milica D. Djekic There are a plenty of methods to determine someone’s identity and the most convenient cases are through fingerprint, iris detection, DNA and so on, while some […] The post Identity Management Challenges appeared first on Cyber…

Hacking and Cybersecurity

Trends to Look Out for in 2024 By Yashin Manraj, CEO, Pvotal Technologies For cybersecurity professionals, remaining effective requires staying on top of a constantly evolving arsenal of attack strategies […] The post Hacking and Cybersecurity appeared first on Cyber…

Stop Managing Identities, Segment them Instead

By Sagie Dulce, VP Research, Zero Networks A Brief History of Identity Management  For as long as there have been identities, there have been solutions trying to manage them so […] The post Stop Managing Identities, Segment them Instead appeared…

Good Security Is About Iteration, Not Perfection.

By Craig Burland, CISO, Inversion6 In the dynamic and unpredictable realm of cybersecurity, striving for perfect solutions can be a futile and counterproductive pursuit. There are too many threats to […] The post Good Security Is About Iteration, Not Perfection.…

Data Breach Search Engines

Navigating Access and Security in the Stolen Credentials Landscape By Tom Caliendo, Cybersecurity Reporter, Co-Founder at Brocket Consulting LLC In the last few years, an unprecedented number of stolen login […] The post Data Breach Search Engines appeared first on…

Cybersecurity Trends and Predictions for 2024

By Nick France, CTO at Cybersecurity Leader Sectigo Given the fact that bad actors are always on the prowl, 2024 is off to a fast start with numerous cybersecurity incidents […] The post Cybersecurity Trends and Predictions for 2024 appeared…

Connecting Tech to Black America

By David Lee, Chief Evangelist and Visionary for Tech Diversity As technology rapidly evolves and advances, it can often seem inaccessible and intimidating for the everyday person. For Black Americans […] The post Connecting Tech to Black America appeared first…

The Importance of Cyber Hygiene for Businesses

By Rigo Van den Broeck, Executive Vice President, Cyber Security Product Innovation at Mastercard Cybercrime is set to cost $10.3 trillion worldwide by 2025, and it’s growing fast. It’s a […] The post The Importance of Cyber Hygiene for Businesses…

5 Cybersecurity Resolutions for the New Year

By Roger Spears, Schneider Downs Whenever the new year rolls around, resolutions—to achieve a goal, improve a behavior or continue good practices—abound. And, while many resolutions center personal goals such […] The post 5 Cybersecurity Resolutions for the New Year…

Adapting to the Deluge of Cybersecurity Data

By Charlie Thomas, CEO, Deepwatch The ever-increasing volume of security data is becoming unmanageable through conventional data analysis, security tools and management techniques. Security teams are deluged with logs, events, […] The post Adapting to the Deluge of Cybersecurity Data…

When Security Collides with Customer Impatience

How Biographic and Biometric Information Work as a Team to Solve the Problem By Raj Ananthanpillai, CEO, Trua Online customers don’t take long to get fidgety. They want their transactions […] The post When Security Collides with Customer Impatience appeared…

DevSecOps Practices for a Secure Cloud

How to start ahead of the curve? By Vishakha Sadhwani, Customer Engineer, Google Cloud In today’s rapidly evolving technological landscape, a strong cultural practice like DevSecOps is essential. It empowers […] The post DevSecOps Practices for a Secure Cloud appeared…

Vendors Beware of the Cybersecurity Audit

By Caroline McCaffery, Co-Founder and CEO of ClearOPS Introduction to Vendor Management Why does every license agreement and data protection addendum, suddenly, include a right for the buyer to perform […] The post Vendors Beware of the Cybersecurity Audit appeared…

Three Key Threats Fueling the Future of Cyber Attacks

By Rishi Baviskar, Global Head of Cyber Risk Consulting at Allianz Commercial Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat […] The post Three Key Threats Fueling the Future of…

The Quantum Shift

Preparing Cybersecurity for a New Era By Sercan Okur, VP of Technology, NextRay In contrast to my previous pieces, I intend to commence this piece with a hypothetical calamitous situation. […] The post The Quantum Shift appeared first on Cyber…

CISO Life: the Good, the Bad, the Ugly

What type of things can go wrong with Senior Leadership, the Org, Legal, HR, etc. by Dan K. Anderson In today’s hectic Cyber world, the role of CISO continues to […] The post CISO Life: the Good, the Bad, the…

Government Communications: The Threats

By Nicole Allen, Marketing Manager at Salt Communications In an age where information flows freely and rapidly, government communications have never been more vulnerable. The digital age has ushered in […] The post Government Communications: The Threats appeared first on…

SASE and Zero Trust: A Powerful Combination

By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Gone are the days when network security resembled a medieval castle. It was protected by a robust drawbridge and moat. In our […] The post SASE and Zero Trust: A Powerful Combination…

A 5-Minute Refresher to Cryptography

 (featuring Alice and Bob) by Rajvi Shroff It’s an age-old question. Alice wants to send a message to Bob. But how can Alice send it to Bob without Eve, the […] The post A 5-Minute Refresher to Cryptography appeared first…

Bridging IT and OT Cybersecurity with AI

Reduce Alerts by 57% with Difenda AIRO By Andrew Hodges, VP Service Delivery & Product Development, Difenda In a technology-driven world, where even the most everyday devices are connected to […] The post Bridging IT and OT Cybersecurity with AI…

Accelerate the path to PCI DSS 4.0 adoption

By Héctor Guillermo Martínez, President of GM Sectec With the release of a new version of the PCI DSS 4.0 Payment Card Industry Data Security Standard, the safety and security […] The post Accelerate the path to PCI DSS 4.0…

Passwords In the Air

By Gautam Hazari, Chief Technology Officer, Sekura.id Imagine, you are sitting in a café, sipping the skillfully crafted coffee by the barista, with your laptop placed on the table in […] The post Passwords In the Air appeared first on…

Key Differences in Securing OT & IT Environments

Critical cybersecurity components every security leader must know amid the convergence of IT & OT By Joe O’Donnell, EVP of Corporate Development, Cyolo The increasing cyberattacks against critical sectors, in […] The post Key Differences in Securing OT & IT…

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…

Implementing ZTA: Benefits and Best Practices

By Eric Sugar, President, ProServeIT In an era defined by the relentless advance of digitalization and the ever-expanding interconnectivity of industrial systems, the realm of cybersecurity has been thrust into […] The post Implementing ZTA: Benefits and Best Practices appeared…

Enhancing The Nation’s Cybersecurity Workforce

Supporting Critical Infrastructure Resilience with Skill-Based Labor By Randall Sandone, Executive Director, Critical Infrastructure Resilience Institute at The Grainger College of Engineering at the University of Illinois Urbana-Champaign “With almost […] The post Enhancing The Nation’s Cybersecurity Workforce appeared first…

Does Zero Trust Improve Productivity?

By Zac Amos, Features Editor, ReHack Zero trust has gained significant attention as an effective approach to secure digital assets. It’s a security framework that’s also believed to impact employee […] The post Does Zero Trust Improve Productivity? appeared first…

Cybersecurity Threats in Global Satellite Internet

By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the […] The post Cybersecurity Threats in Global Satellite Internet appeared…

Classic Information Security Management Errors

How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as an information security expert, I encounter numerous errors, many of […] The post Classic Information Security Management Errors appeared first…

Prioritizing Action After the Threat Headlines

By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially cybersecurity professionals, know the feeling. Minutes – sometimes seconds – […] The post Prioritizing Action After the Threat Headlines appeared…

Deepfakes and AI’s New Threat to Security

The high cost of free open-source generative software. By Luke Arrigoni, Founder, Loti The rise of deepfake technology poses significant risks to celebrities, high-net-worth individuals, and the general public, with […] The post Deepfakes and AI’s New Threat to Security…

Addressing Bias in Insider Risk Monitoring

By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […] The post Addressing Bias in Insider Risk Monitoring appeared…

ImmuniWeb AI Platform

Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […] The post ImmuniWeb AI Platform appeared first on Cyber…

Safeguarding the Code That Drives Modern Vehicles

By Soujanya Ain is a Product Marketing Manager at GitGuardian The automotive landscape has evolved dramatically, from mechanical marvels to sophisticated platforms on wheels driven by intricate computer systems. Surprisingly, […] The post Safeguarding the Code That Drives Modern Vehicles…

SIEM vs XDR: Capabilities and Key Differences

We compare the differences in SIEM and XDR’s respective contributions to security By Aimei Wei, Chief Technical Officer and Founder, Stellar Cyber All enterprises comprise vast webs of interconnected devices. […] The post SIEM vs XDR: Capabilities and Key Differences…

Generative Ai: The Future of Cloud Security

By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation Generative AI: The Future of Cloud Security As the digital landscape undergoes a relentless […] The post Generative Ai: The Future of Cloud Security…

What You Need to Know About the Cybersecurity Market in 2024

By Doug Saylors, Partner, Co-lead, Cybersecurity, Information Services Group (ISG) The cybersecurity market offers promising opportunities for real-time threat intelligence through advanced technologies such as AI and ML. It’s also […] The post What You Need to Know About the…

Safeguarding Children in the Era of Big Data

By Ron Kerbs, CEO, Kidas In the ever-evolving landscape of cyberspace, 2023 unveiled a concerning trend: major players in the tech industry, including giants like Meta and Discord, were found […] The post Safeguarding Children in the Era of Big…