Category: Cyber Defense Magazine

Humans Just Can’t Cut it Anymore

This article has been indexed from Cyber Defense Magazine By Peter Stephenson, PhD, CISSP (lifetime), FAAFS (2015-16) Let’s face it, folks… when it comes to interdicting and […] The post Humans Just Can’t Cut it Anymore appeared first on Cyber…

Android stalkerware, a danger for victims and stalkers

This article has been indexed from Cyber Defense Magazine ESET research shows that Android stalkerware apps are affected by vulnerabilities that further threaten victims. ESET research reveals […] The post Android stalkerware, a danger for victims and stalkers appeared first…

How to Become Unattractive for Cybercriminals

This article has been indexed from Cyber Defense Magazine Map, monitor, and manage your attack surface to stay a step ahead By Stijn Vande Casteele, Founder and […] The post How to Become Unattractive for Cybercriminals appeared first on Cyber…

Reconnect with the security industry virtually this June

This article has been indexed from Cyber Defense Magazine Building on a successful portfolio of in-person and digital events, IFSEC International is preparing for the opening of […] The post Reconnect with the security industry virtually this June appeared first…

The Case for Open XDR

This article has been indexed from Cyber Defense Magazine The current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, […] The post The Case for Open XDR appeared first on Cyber Defense…

Secure Data Recovery Services: Protecting Business Continuity

This article has been indexed from Cyber Defense Magazine By Dmitriy Kardashev, Founder and CEO, SecureData, Inc. In today’s world, consumers and businesses alike require consistent and […] The post Secure Data Recovery Services: Protecting Business Continuity appeared first on…

A cyberattack shutdown US Colonial Pipeline

A cyberattack forced the shutdown of one of the largest pipelines in the United States, the Colonial Pipeline […] The post A cyberattack shutdown US Colonial Pipeline appeared first on Cyber Defense Magazine. Read the original article: A cyberattack shutdown…

Hundreds of millions Of Dell PCs affected by CVE-2021-21551 flaws

American multinational computer technology giant Dell addresses a 12-year-old driver flaw, tracked as CVE-2021-21551, impacting millions of computers. […] The post Hundreds of millions Of Dell PCs affected by CVE-2021-21551 flaws appeared first on Cyber Defense Magazine. Read the original…

Patchstack Protects The Web With Community

Read the original article: Patchstack Protects The Web With Community By Oliver Sild, the co-founder and CEO of […]Content was cut in order to protect the source.Please visit the source for the rest of the article. Read the original article:…

Peer-To-Peer Cybersecurity Insights For 2021

Read the original article: Peer-To-Peer Cybersecurity Insights For 2021 Based on real practitioners’ experiences By Stuart Berman, IT Central Station Super User December is typically a month […] The post Peer-To-Peer Cybersecurity Insights For 2021 appeared first on Cyber Defense…

The Best Network Protection: Go Deep or Go Broad?

Read the original article: The Best Network Protection: Go Deep or Go Broad? By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners […] The post The Best Network Protection: Go Deep…

Are Encrypted Communication Apps used for Crime Operations?

Read the original article: Are Encrypted Communication Apps used for Crime Operations? By Nicole Allen, Marketing Executive,  SaltDNA. Police have successfully infiltrated some of the biggest criminal markets on the […] The post Are Encrypted Communication Apps used for Crime…

Why Security Shouldn’t Only Fall on Employees

Read the original article: Why Security Shouldn’t Only Fall on Employees By Amit Bareket, Co-founder and CEO, Perimeter 81 As each day passes by, the news of a new […] The post Why Security Shouldn’t Only Fall on Employees appeared…

Analytics & Security Insight On 2021 And Beyond

Read the original article: Analytics & Security Insight On 2021 And Beyond Predictions for the Future of the Security Space By Billy Spears, Chief Information Security Officer, Alteryx 2020 has […] The post Analytics & Security Insight On 2021 And…

Industry 4.0 under Threat Landscape

Read the original article: Industry 4.0 under Threat Landscape By Milica D. Djekic New tendencies in the technological landscape have brought new challenges in safety and security […] The post Industry 4.0 under Threat Landscape appeared first on Cyber Defense…

Cybersecurity Predictions For 2021

Read the original article: Cybersecurity Predictions For 2021 Preparing for the “next normal” By Topher Tebow, Cybersecurity Analyst (Malware), Acronis For cybersecurity professionals, this year began […] The post Cybersecurity Predictions For 2021 appeared first on Cyber Defense Magazine.  …

The 5 Biggest Mistakes in SD-WAN Security

Read the original article: The 5 Biggest Mistakes in SD-WAN Security 2020 taught organizations that the traditional 9-5 office is a thing of the past. Not only has the […] The post The 5 Biggest Mistakes in SD-WAN Security appeared…

Working from Home? You’re Not Alone

Read the original article: Working from Home? You’re Not Alone The rise of cyber hacks in an age of remote working – and how to prevent them By […] The post Working from Home? You’re Not Alone appeared first on…

Detecting Privilege Escalation

Read the original article: Detecting Privilege Escalation By Garret Grajek, CEO, YouAttest During the first half of 2020 alone, over 36 billion records were exposed […] The post Detecting Privilege Escalation appeared first on Cyber Defense Magazine.   Become a…

When Businesses Get Hacked- Who Are the Victims?

Read the original article: When Businesses Get Hacked- Who Are the Victims? This article looks into who the victims are when an organization comes under attack. By Nicole Allen, Marketing […] The post When Businesses Get Hacked- Who Are the…

T-Mobile customers were hit with SIM swapping attacks

Read the original article: T-Mobile customers were hit with SIM swapping attacks The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM […] The post T-Mobile customers were hit with SIM swapping…

Top 100 Cybersecurity Hackers

Read the original article: Top 100 Cybersecurity Hackers The following list, in no particular order, contains the names, their countries of origins, their (biggest) victim (s) […] The post Top 100 Cybersecurity Hackers appeared first on Cyber Defense Magazine.  …

Top 100 Cybersecurity Breaches

Read the original article: Top 100 Cybersecurity Breaches Looking back over the past year, it’s impossible not to recognize the widespread data breaches that have caused […] The post Top 100 Cybersecurity Breaches appeared first on Cyber Defense Magazine.  …

Top 100 Managed Security Service Providers (MSSPs)

Read the original article: Top 100 Managed Security Service Providers (MSSPs) Well, let’s start with the basics. What is MSSP? It is short for Managed Security Service Provider. As […] The post Top 100 Managed Security Service Providers (MSSPs) appeared…

Top 100 Cybersecurity Movies

Read the original article: Top 100 Cybersecurity Movies The Computer Wore Tennis Shoes (1969) In The Computer Wore Tennis Shoes, Kurt Russell stars as an underachieving […] The post Top 100 Cybersecurity Movies appeared first on Cyber Defense Magazine.  …

Channeling as A Challenge

Read the original article: Channeling as A Challenge By Milica D. Djekic Abstract: The modern cyber systems could deal with some kinds of information leakage concerns […] The post Channeling as A Challenge appeared first on Cyber Defense Magazine.  …

Top 100 Cybersecurity Books

Read the original article: Top 100 Cybersecurity Books The Best Cybersecurity Book of all Time:  Analogue Network Security by Winn Schwartau For many centuries, books have […] The post Top 100 Cybersecurity Books appeared first on Cyber Defense Magazine.  …

Top 100 Cybersecurity News Sites

Read the original article: Top 100 Cybersecurity News Sites With millions of websites and downloadable files available on the internet, potential risks of security breach are high, […] The post Top 100 Cybersecurity News Sites appeared first on Cyber Defense…

Vulnerability Patching: Why Does It Fall Short So Often?

Read the original article: Vulnerability Patching: Why Does It Fall Short So Often? Weak threat insight, SecOps competing priorities, and fear of making things worse are key reasons By Chris Goettl, […] The post Vulnerability Patching: Why Does It Fall…

Brave New World: Safari Content Blocking

Read the original article: Brave New World: Safari Content Blocking By Andrey Meshkov, CEO and CTO at AdGuard Content blocking is not a priority for Apple and WebKit. […] The post Brave New World: Safari Content Blocking appeared first on…

MSSP Visionary Takes Bold Step into the Future

Read the original article: MSSP Visionary Takes Bold Step into the Future A Cyber Defense Magazine Exclusive Interview with Herjavec Group Founder & CEO Robert Herjavec UNDERSTANDING VISIONARIES LIKE ROBERT […] The post MSSP Visionary Takes Bold Step into the…

Data Risk, Intelligence and Insider Threats

Read the original article: Data Risk, Intelligence and Insider Threats When it comes to securing networks in today’s business environment, the single biggest challenge firms must contend with […] The post Data Risk, Intelligence and Insider Threats appeared first on…

Cyber Threats Facing Financial Institutions Amid COVID-19

Read the original article: Cyber Threats Facing Financial Institutions Amid COVID-19 By Pablo Castillo, Cyber Threat Research Analyst, Constella Intelligence COVID-19 has accelerated security research into the cybersecurity implications […] The post Cyber Threats Facing Financial Institutions Amid COVID-19 appeared…

3.2billion records leaked, Part II

Read the original article: 3.2billion records leaked, Part II The Largest compilation of emails and passwords (COMB), more than 3.2 billion login credentials, has been leaked on […] The post 3.2billion records leaked, Part II appeared first on Cyber Defense…

Cyberattacks On K-12 Education

Read the original article: Cyberattacks On K-12 Education Carefully allocating limited resources lets districts get the best bang for the buck. By Saryu Nayyar, CEO, Gurucul […] The post Cyberattacks On K-12 Education appeared first on Cyber Defense Magazine.  …