Category: Cyber Defense Magazine

Publisher’s Spotlight: Merlin Group

Bridging the Gap Between Cyber Innovation and Regulated Markets Addressing the Challenge of Innovation Access in Regulated Markets In an era where the need for technological innovation is more critical… The post Publisher’s Spotlight: Merlin Group appeared first on Cyber…

Air Gap

In August 2024, the FBI issued a notice that an Iranian backed team was attempting to hack American political parties’ campaign information. (Miller & Balsamo, 2024). In that same month,… The post Air Gap appeared first on Cyber Defense Magazine.…

Protecting Your Organization Against Advanced, Multi-Stage Cyber Attacks

Threat actors are continuously enhancing their techniques and increasing sophistication to evade cyber defenses. Consequently, multi-stage ransomware and malware attacks, characterized by heavy obfuscation are becoming increasingly prevalent. The Europol Threat… The post Protecting Your Organization Against Advanced, Multi-Stage Cyber Attacks…

The Cyber Defense Emergency Room

In cybersecurity like in the emergency room, every moment is critical. Much like an emergency room, where nurses must quickly assess and prioritize patients based on the severity of their… The post The Cyber Defense Emergency Room appeared first on…

Guardians Of the Grid

The surge in cyberattacks and the emerging role of Generative AI The importance of cyber security tools in protecting sensitive information, sustaining organization’s resilience and enabling business continuity during hostile… The post Guardians Of the Grid appeared first on Cyber…

Exploring CVSS 4.0’s Impact on Vulnerability and Threat Management

The Common Vulnerability Scoring System (CVSS) offers a standardized framework for characterizing and scoring vulnerabilities, helping the effort for vulnerability risk assessment. The release of CVSS 4.0 in November 2023 marked a… The post Exploring CVSS 4.0’s Impact on Vulnerability and Threat…

Fortifying The Links

In today’s hyper-connected world, supply chains are the lifeblood of industries, spanning across continents and involving numerous third-party vendors. While this interconnectedness brings unparalleled efficiency and opportunities for growth, it… The post Fortifying The Links appeared first on Cyber Defense…

The Key to AI-Enabled Multi-Coalition Warfare

In February, the top artificial intelligence (AI) official at the Department of Defense (DoD) laid out his vision for AI-enabled warfare. “Imagine a world where combatant commanders can see everything they… The post The Key to AI-Enabled Multi-Coalition Warfare appeared first…

The Role of AI in Evolving Cybersecurity Attacks

In the ever-expanding digital landscape, cybersecurity remains a critical concern for individuals, businesses, and governments alike. As technology advances, so do the tactics of cybercriminals. One of the most significant… The post The Role of AI in Evolving Cybersecurity Attacks…

The Fundamental Components to Achieving Shift-Left Success

“Shift-left” is a familiar concept to CISOs and security practitioners across the globe. A term coined to promote the integration of security practices earlier in the software development lifecycle (SDLC)… The post The Fundamental Components to Achieving Shift-Left Success appeared…

Protect SAP Supply Chains by Preventing Cyber Attacks

Highly advanced and extremely dangerous cyberattacks are targeting SAP (from the company originally called “System Analysis Program” Development) software supply chains with an alarming increase in frequency. By taking advantage… The post Protect SAP Supply Chains by Preventing Cyber Attacks…