by Dan K. Anderson CEO, CISO, and vCISO As cyber threats grow more sophisticated and frequent, organizations face immense pressure to simplify their security stacks and improve operational efficiency. According… The post Innovator Spotlight: Fortra appeared first on Cyber Defense…
Category: Cyber Defense Magazine
Protect SAP Supply Chains by Preventing Cyber Attacks
Highly advanced and extremely dangerous cyberattacks are targeting SAP (from the company originally called “System Analysis Program” Development) software supply chains with an alarming increase in frequency. By taking advantage… The post Protect SAP Supply Chains by Preventing Cyber Attacks…
Breaking Up with Your Password: Why It’s Time to Move On
Data breaches impacted more than 1 billion users in the first half of 2024, up 409% from this time last year, emphasizing the importance of maintaining stealth cyber hygiene. The truth is, as… The post Breaking Up with Your Password: Why It’s Time…
Big Faces, Big Spend, Low ROI: Why Ad Fraud is Increasingly Damaging Brands
Brands are increasingly seen to be employing familiar and expensive faces to ambassador ad campaigns and new products. However, with an estimated 26% of ad spend lost to ad fraud, businesses are… The post Big Faces, Big Spend, Low ROI: Why Ad…
Beyond Encryption: Advancing Data-in-Use Protection
In the ever-evolving landscape of cryptography, traditional encryption methods safeguarding data at rest and in transit remain foundational to cybersecurity strategies. However, the security of decrypted data actively used within… The post Beyond Encryption: Advancing Data-in-Use Protection appeared first on…
Benefits of Network Monitoring Systems
Maintaining a resilient, secure, and efficient network infrastructure is more important than ever. Network monitoring systems, which encompass both hardware and software tools, play a pivotal role in achieving this… The post Benefits of Network Monitoring Systems appeared first on…
Autonomous, Deterministic Security for Mission-Critical IOT Systems
Mission-Critical Iot Systems: Cybersecurity Principles In creating an effective cybersecurity strategy for IoT systems, software architects examine obstacles that limit the security options for their target systems. To deliver a… The post Autonomous, Deterministic Security for Mission-Critical IOT Systems appeared…
The Unsolvable Problem: XZ and Modern Infrastructure
The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst up at night. The recent XZ backdoor attack is finally… The post The Unsolvable Problem: XZ and Modern Infrastructure appeared…
A Cloud Reality Check for Federal Agencies
The move to cloud is not slowing down – spending by Federal civilian agencies on cloud computing could reach $8.3 billion in Fiscal Year (FY) 2025. But despite years of guidance (from… The post A Cloud Reality Check for Federal Agencies appeared…
A CISO’s Guide to Managing Risk as the World Embraces AI
As Generative AI becomes more deeply integrated into our digital landscape, organizations face a growing need to manage application, technology, and cybersecurity risks effectively. The rapid evolution of AI technology… The post A CISO’s Guide to Managing Risk as the…
Sacumen Advances to the Front Line of Thought Leadership: Accelerates Cybersecurity Integration with Innovative Program
Cyber Defense Magazine Thought Leadership Interview with Nitesh Sinha, Founder and CEO of Sacumen and Praneeth Kudithipudi EVP Sales of Sacumen By Yan Ross, CDM Editor-in-Chief Editor’s Note: Cyber Defense… The post Sacumen Advances to the Front Line of Thought…
Why Manufacturing IT Leaders are Turning to AI-Powered Cybersecurity Training
In the rapidly evolving digital landscape, cybersecurity has emerged as a critical concern, particularly for the manufacturing sector. Recent data highlights a staggering 165% surge in cyber-attack attempts on manufacturing facilities, a… The post Why Manufacturing IT Leaders are Turning to AI-Powered…
BYTE BY BYTE
In an era where digital transformation is reshaping healthcare, dental practices find themselves caught in a perfect storm of cybersecurity vulnerabilities. As ransomware attacks surge across the healthcare sector, dental… The post BYTE BY BYTE appeared first on Cyber Defense…
Steps To Protect Against Cybersecurity Threats During Mergers and Acquisitions
Transactions involving U.S. targets and acquirers continue to represent a substantial percentage of overall deal volume, with U.S. M&A exceeding $1.26 trillion in 2023, according to research from the Harvard Law… The post Steps To Protect Against Cybersecurity Threats During Mergers…
Halting Hackers on the Holidays: Protecting Yourself from Seasonal Cyber Threats
by Gary S. Miliefsky, CISSP, fmDHS Ho-ho-hold on to your data! 🎅 The holiday season is here, bringing cheer, gifts, and…cybercriminals?! That’s right! While you’re decking the halls, hackers are… The post Halting Hackers on the Holidays: Protecting Yourself from…
Preparing for EU AI Act from a Security Perspective
The world’s first artificial intelligence law, the EU AI Act, finally came into effect on 1 Aug 2024, 4 years after it was initially proposed by the European Commission. After… The post Preparing for EU AI Act from a Security…
The Initial Engagement Process for Contracting with a vCISO
Introduction In today’s fast-paced digital world, organizations face a myriad of cybersecurity challenges that demand expert guidance and strategic oversight. Enter the Virtual Chief Information Security Officer (vCISO), a role… The post The Initial Engagement Process for Contracting with a…
Shifting The Focus: From Compliance to Secops In Supply Chain Security
There are two main reasons why supply chain attacks are on the increase. First, there is a general trend of companies outsourcing more critical business functions to external providers, and… The post Shifting The Focus: From Compliance to Secops In…
Guarding the Games: Cybersecurity and the 2024 Summer Olympics
As Paris prepares to host the 2024 Summer Olympic Games, athletes from around the world converge to represent their country. But beyond the cheers and medals lies a digital underworld…. The post Guarding the Games: Cybersecurity and the 2024 Summer…
Fortifying the Future: AI Security Is The Cornerstone Of The AI And GenAI Ecosystem
The rapid proliferation of AI technologies is bringing about significant advancements, but it has also introduced a wide range of security challenges. Large language models (LLMs) and computer vision models,… The post Fortifying the Future: AI Security Is The Cornerstone…