With the help of today’s technology, virtually anyone can create a passable deepfake—a manipulated image, video, or audio recording that seems real. All that is required is a consumer-grade computer… The post Deepfakes: How Deep Can They Go? appeared first…
Category: Cyber Defense Magazine
Is Platform Engineering a Step Towards Better Governed DevOps?
Since 2010, Puppet’s annual State of DevOps Report has tracked trends in IT, including security and, more recently, the growth of platform engineering. 2024’s edition, which includes the results of… The post Is Platform Engineering a Step Towards Better Governed…
Why the Growing Risk of Cyber Inequity Threatens Critical Infrastructure
Cyber inequity is a growing chasm that continues to separate organizations with robust cybersecurity and technology capabilities from those without. This digital divide is a global cybersecurity crisis in the… The post Why the Growing Risk of Cyber Inequity Threatens…
How to Root Out Malicious Employees
Malicious employees and insider threats pose one of the biggest security risks to organizations, as these users have more access and permissions than cyber criminals attacking the organisation externally. It… The post How to Root Out Malicious Employees appeared first…
Cyber Security in Customer Engagement: The Triple Defence Strategy
As digital interactions dominate modern communication, the rapid evolution of cyber threats demands robust security measures in customer engagement as a critical imperative. Traditional security methods are no longer sufficient,… The post Cyber Security in Customer Engagement: The Triple Defence…
Navigating the New Frontier: Strengthening Cybersecurity Through Next-Gen Identity & Access Governance
It can be difficult to fully appreciate just what has changed when it comes to cybersecurity – and by how much. Up until around two decades ago, the network was the definitive… The post Navigating the New Frontier: Strengthening Cybersecurity Through Next-Gen…
20% of Organizations Have Experienced a Non-Human Identity Security Incident
Today’s business environment requires teams to do more — better than before, and at a faster rate. Thanks to third-party apps, no-code platforms, GenAI, and other forms of automation and… The post 20% of Organizations Have Experienced a Non-Human Identity…
Binary Cryptology with the Internet of Things Communication
The home and office-based internet is a quite cheap resource that is everything, but not reliable and trusted as it is possible conducting a cyber-attack from anywhere and anytime, so… The post Binary Cryptology with the Internet of Things Communication…
Can Your Security Measures Be Turned Against You?
Throughout history, the concept of defeating an opponent’s defenses has been central to warfare strategies. From ancient sieges using tunnels and siege engines to modern tactics aimed at neutralizing air… The post Can Your Security Measures Be Turned Against You?…
The Foundation of Data Security: Why Data Discovery Is the Critical First Step
In the complex world of cybersecurity, one fundamental truth remains constant: you can’t protect what you don’t know exists. This is why data discovery stands as the cornerstone of any… The post The Foundation of Data Security: Why Data Discovery…
Cybersecurity’s Broken Model: The Cost of Overcomplication and Underperformance
Cybersecurity is in need of a reckoning. Global cybersecurity spend reached a record $79.2 billion in 2023 and is expected to grow by almost 10% this year – a reflection of the… The post Cybersecurity’s Broken Model: The Cost of Overcomplication and…
A Step-by-Step Guide to the NIST Risk Management Framework (RMF): Simplifying Risk Management for Small Enterprises
As the decade nears its halfway mark, ransomware attacks continue to dominate headlines across newspapers and website homepages. The relentless uptick in attacks shows no signs of slowing down, and small and mid-sized businesses… The post A Step-by-Step Guide to the NIST Risk Management…
Integrating AI into Network Security for Improved Threat Detection
Have you ever wondered how your digital security can keep up with the lightning-fast evolution of cyber threats? The world of cybersecurity is changing faster than ever, driven by relentless… The post Integrating AI into Network Security for Improved Threat…
Cyber Score, OSINT, and the Transformation of Horiens Risk Advisors in Latin America
Introduction The cybersecurity landscape is constantly evolving, and organizations face increasing challenges in protecting their digital assets, often referred to as the “Crown Jewels.” In this context, the use of… The post Cyber Score, OSINT, and the Transformation of Horiens…
Win or Lose: Using CMMC 2.0 Proposed Rule to Position Yourself for DOD Contracts
The Cybersecurity Maturity Model Certification (CMMC) Program has been a headache for many defense contractors since the idea was first introduced in 2019. The program seeks to protect unclassified information,… The post Win or Lose: Using CMMC 2.0 Proposed Rule…
How The Right Application Server Can Protect Healthcare and Public Institutions from Cyber Attacks
Cybersecurity in the public and healthcare sectors is a growing concern as cyberattacks become increasingly sophisticated and frequent. However, many existing vulnerabilities can be easily addressed to deliver more robust… The post How The Right Application Server Can Protect Healthcare…
To Combat Cyberbullying and Online Fraud, We Must Do More to Protect Minors
The last 20 years have fundamentally redefined how consumers behave online. The emergence of sites such as YouTube, Meta, and X has reshaped how we share and consume media. Online… The post To Combat Cyberbullying and Online Fraud, We Must…
How vCISOs Can Enhance an Organization’s Cybersecurity Posture with Cyber Insurance
In today’s digital age, where cyber threats loom large and data breaches are increasingly common, many organizations are turning to Virtual Chief Information Security Officers (vCISOs) to bolster their cybersecurity frameworks. These… The post How vCISOs Can Enhance an Organization’s Cybersecurity Posture…
Bridging The Manufacturing Security “Air Gap”
In the world of manufacturing, one security measure has stood out above all others: the “air gap.” This technique, which isolates technology from the outside world, once provided a reasonable… The post Bridging The Manufacturing Security “Air Gap” appeared first…
The GenAI Scam Revolution
Introduction The intersection of cutting-edge artificial intelligence technologies and the extensive exposure of personal data has opened a Pandora’s box of potential misuse, including hyper-targeted scams. Large language models (LLMs),… The post The GenAI Scam Revolution appeared first on Cyber…