Category: Cyber Defense Magazine

Innovators Spotlight: OPSWAT

OPSWAT’s Benny Czarny on Retooling the Language of Cybersecurity If you spend enough time in this industry, you start to recognize a pattern. A new “platform” appears, slaps some AI… The post Innovators Spotlight: OPSWAT appeared first on Cyber Defense…

Innovator Spotlight: Axonius

How Axonius is Turning Asset Chaos into Intelligent Action If you have ever sat in a boardroom and been hit with the classic CISO gut-punch questions, you will relate to… The post Innovator Spotlight: Axonius appeared first on Cyber Defense…

Innovator Spotlight: Iru

Iru (Kanji’s) Big Bet on Unified Endpoint Security and Identity If you have spent the last decade juggling an Apple MDM, a Windows tool, a separate EDR, a vulnerability scanner,… The post Innovator Spotlight: Iru appeared first on Cyber Defense…

The Board Is Asking The Wrong Security Question

I have sat in boardrooms where the disconnect is palpable. While cybercrime costs hit $10.5 trillion, only 8% of directors view security as a strategic threat. I see leaders drowning in… The post The Board Is Asking The Wrong Security Question…

Innovator Spotlight: Lineaje

How Lineaje Wants To Make Your Software And AI Supply Chains Boringly Safe If you have spent the last few years drowning in SBOMs, critical CVEs and increasingly anxious board… The post Innovator Spotlight: Lineaje appeared first on Cyber Defense…

Innovators Spotlight: Badge (Part II)

Badge Is Building The Trust Layer Your Agents Have Been Waiting For This article is a continuation of the discussion I had with the Badge team at RSAC 2025 which… The post Innovators Spotlight: Badge (Part II) appeared first on…

The Insurance Industry Is Rewriting Cybersecurity Strategy

Why the Economics of Cyber Risk Are Changing How Organizations Think About Cybersecurity Cybersecurity used to be a technology problem. Today it is becoming an insurability problem. As ransomware and… The post The Insurance Industry Is Rewriting Cybersecurity Strategy appeared…

Smart Office Hacking Challenges

Smart technologies allow devices within a network to communicate through IP connections, but this connectivity also makes them vulnerable to cyberattacks. Many cybercrime techniques show that identifying an IP address… The post Smart Office Hacking Challenges appeared first on Cyber…

The Evolving Role of The CISO In Today’s Security Landscape

Introduction Over the past decade, few corporate roles have transformed as rapidly or as profoundly as the Chief Information Security Officer (CISO). Once regarded as a deeply technical position responsible for firewalls,… The post The Evolving Role of The CISO In Today’s…