Critical national infrastructure (CNI) is at risk in countries across the globe. When attackers target CNI systems—which include power plants, emergency services, hospitals, and transportation—it can cause life-threatening disruptions. We’ve… The post 7 Steps International Organizations Must Take to Defend…
Category: Cyber Defense Magazine
HTTP 1.1 Vs. HTTP 2: What Are the Differences?
According to this recent report by McKinsey, 87% of consumers say they won’t do business with your company if they have concerns about your security practices. So if you’re serious about protecting… The post HTTP 1.1 Vs. HTTP 2: What Are the…
How to Use AI in Cyber Deception
For years, cyber deception has been an excellent tool against would-be cybercriminals. However, the cybersecurity landscape is constantly evolving — and many conventional techniques are no longer as effective. Is… The post How to Use AI in Cyber Deception appeared…
How To Privacy-Proof the Coming AI Wave
Everyone has noticed that we have entered the AI era. AI is everywhere: to improve customer experience, reduce costs, generate stunning and surreal images. The size of the Artificial Intelligence… The post How To Privacy-Proof the Coming AI Wave appeared…
How To Fight Scattered Spider Impersonating Calls to The IT Help Desk
Imagine you worked for years on building your cyber defense. You built all the systems you need, all the policies are in place, and you are humming along. When the… The post How To Fight Scattered Spider Impersonating Calls to…
How Government Agencies Can Level the Cybersecurity Playing Field With AI/ML
The threat cybercriminals pose to federal information systems and networks is real and pervasive. Defending against unauthorized intrusions is a full-time effort for federal agencies and the contractors that support… The post How Government Agencies Can Level the Cybersecurity Playing…
Growing Enterprise Data is Creating Big Cybersecurity Risk
Buzz about big data permeated tech conversations in the mid-1990s, but people today don’t talk as much about big data anymore. It’s not that data isn’t big. Data is bigger… The post Growing Enterprise Data is Creating Big Cybersecurity Risk…
Exploring the Vishing Threat Landscape
Voice phishing, also known as vishing, represents a growing threat to organizations worldwide. Keepnet’s 2024 Vishing Response Report illuminates the alarming statistic that 70% of companies are prone to voice… The post Exploring the Vishing Threat Landscape appeared first on…
Cybersecurity: How to Involve People in Risk Mitigation
Cybersecurity: how to involve people in risk mitigation Cefriel presented the white paper “Cyber Security and the Human Element”, an in-depth look at how to analyze and understand the connections… The post Cybersecurity: How to Involve People in Risk Mitigation…
SWARM: Pioneering The Future of Autonomous Drone Operations and Electronic Warfare
Modern unmanned technologies are experiencing rapid growth, encompassing both civilian and military applications. Autonomous vehicles, delivery drones, and unmanned aerial vehicles for rescue and firefighting services have become an integral… The post SWARM: Pioneering The Future of Autonomous Drone Operations…
The Advent of Quantum Cryptography and Zero Trust: A New Era In The World Of Cybersecurity
Short description The advancement of cybersecurity is propelled by adapting to new technologies and rising threats. From quantum cryptography to Zero Trust models and pioneering innovations from industry leaders, the… The post The Advent of Quantum Cryptography and Zero Trust:…
RSA Conference: 20th annual RSAC Innovation Sandbox and fifth annual Launch Pad contests are now open.
San Francisco, CA – January 14, 2025 – RSA Conference™, the world’s leading information security conferences and expositions, today announced that submissions for the 20th annual RSAC Innovation Sandbox and fifth annual… The post RSA Conference: 20th annual RSAC Innovation Sandbox and…
Exposure Management: A Strategic Approach to Cyber Security Resource Constraint
Imagine being bombarded by a relentless barrage of alarms, each one clamouring for immediate attention. This is the daily reality for cyber security teams, overwhelmed by alerts from countless sources,… The post Exposure Management: A Strategic Approach to Cyber Security…
Publisher’s Spotlight: Merlin Group
Bridging the Gap Between Cyber Innovation and Regulated Markets Addressing the Challenge of Innovation Access in Regulated Markets In an era where the need for technological innovation is more critical… The post Publisher’s Spotlight: Merlin Group appeared first on Cyber…
Air Gap
In August 2024, the FBI issued a notice that an Iranian backed team was attempting to hack American political parties’ campaign information. (Miller & Balsamo, 2024). In that same month,… The post Air Gap appeared first on Cyber Defense Magazine.…
Protecting Your Organization Against Advanced, Multi-Stage Cyber Attacks
Threat actors are continuously enhancing their techniques and increasing sophistication to evade cyber defenses. Consequently, multi-stage ransomware and malware attacks, characterized by heavy obfuscation are becoming increasingly prevalent. The Europol Threat… The post Protecting Your Organization Against Advanced, Multi-Stage Cyber Attacks…
Data Decay and Cybersecurity: Understanding The Risks And Mitigating The Impact On Your Business
Becoming successful in this digital age means your business operations, decision-making, and customer relationships are primarily powered by your data. Unfortunately, the quality of your data diminishes as time passes…. The post Data Decay and Cybersecurity: Understanding The Risks And…
The Cyber Defense Emergency Room
In cybersecurity like in the emergency room, every moment is critical. Much like an emergency room, where nurses must quickly assess and prioritize patients based on the severity of their… The post The Cyber Defense Emergency Room appeared first on…
Phishing in 2024: Navigating the Persistent Threat and AI’s Double-Edged Sword
In 2024, phishing remains one of the most prevalent and dangerous cybersecurity threats. Despite advancements in technology and increased awareness, cybercriminals continue to exploit human vulnerabilities, adapting their tactics to… The post Phishing in 2024: Navigating the Persistent Threat and…
Elevating Security: The Crucial Role of Effective API Management in Today’s Digital Landscape
In today’s digital landscape, the increasing reliance on Application Programming Interfaces (APIs) brings significant security challenges that organizations must address. The Salt Labs State of API Security Report, 2024, reveals that… The post Elevating Security: The Crucial Role of Effective API…