by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,… The post The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance…
Category: Cyber Defense Magazine
DNS Security Strategies: Protecting Against Ransomware, Botnets, And Data Theft
Protecting against the growing spectrum of cyber threats, including ransomware, botnets, and data theft, is fundamental for ensuring strong cybersecurity measures. DNS can be used within such a defense strategy… The post DNS Security Strategies: Protecting Against Ransomware, Botnets, And…
Data Breaches are a Dime a Dozen: It’s Time for a New Cybersecurity Paradigm
Data breaches have accelerated quickly in 2024. Google ‘data breach’ and you’re in for a whirlwind of high-profile names scattered across headlines of thousands, and sometimes millions, of customer and… The post Data Breaches are a Dime a Dozen: It’s…
Uncovering the Gaps in Cyberthreat Detection & the Hidden Weaknesses of SIEM
Cybersecurity tools and technologies are continuously being developed and refined to keep pace with the growing threat landscape. One tool we’re all familiar with is the Security Information and Event… The post Uncovering the Gaps in Cyberthreat Detection & the…
How to maximize cybersecurity ROI
Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf of Cynet in October 2024…. The post How to maximize cybersecurity ROI appeared first on…
Innovator Spotlight: Push Security
Identity is the new perimeter. Attackers are no longer hacking into your organization—they’re logging in with compromised credentials. Push Security is countering this shift with a browser-based identity security platform… The post Innovator Spotlight: Push Security appeared first on Cyber…
The AT&T Phone Records Stolen
In today’s digital age, the importance of cybersecurity must be re-balanced. With increasing cyberattacks and data breaches, organizations must prioritize protecting their customers’ sensitive information. Unfortunately, AT&T has recently fallen… The post The AT&T Phone Records Stolen appeared first on…
Cyber Risks for Government Agencies Are on the Rise. Why Security Is Still an Uphill Battle
State and local government and education organizations (also known as SLED) were always at risk from cyberattacks, but the rise of generative AI has increased those risks significantly. Attackers are far more… The post Cyber Risks for Government Agencies Are on the…
Cyber Threat Intelligence (CTI) for Supply Chain Monitoring
Executive summary Many companies face various risks across their supply chain, which are increasing, especially cyber threats. Studies indicate that nearly all companies have at least one supplier that has… The post Cyber Threat Intelligence (CTI) for Supply Chain Monitoring…
Overcoming Cybersecurity Integration Roadblocks
As a CEO working alongside cybersecurity product companies, I know that integration & the connectors are necessary evil for cyber security products companies. For companies in our industry, seamless, reliable… The post Overcoming Cybersecurity Integration Roadblocks appeared first on Cyber…
Spotlight on Dashlane
Dashlane is the leading enterprise credential manager that secures access and proactively protects against breaches. In an era where painfully simple password spraying and phishing attacks are still the primary… The post Spotlight on Dashlane appeared first on Cyber Defense…
Spotlight on Onyxia
Onyxia’s Cybersecurity Management Platform delivers predictive insights and data intelligence that allow CISOs to gain a complete view of their cybersecurity program performance, achieve organizational compliance, increase security stack efficiency,… The post Spotlight on Onyxia appeared first on Cyber Defense…
Why Did Snowflake Have a Target on It? Handling Data Warehouse Security Risks
In early June, the Ticketmaster breach brought widespread attention to the fact that Snowflake accounts did not require multi-factor authentication (MFA) and some were compromised as a result. If only… The post Why Did Snowflake Have a Target on It?…
Building Resilience: A Post-Breach Security Strategy for Any Organization
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to significantly enhance their security posture. Drawing from my experience as… The post Building Resilience: A Post-Breach Security Strategy for Any…
Innovator Spotlight: Cloud Range
by Dan K. Anderson CEO, CISO, and vCISO The cybersecurity landscape is rapidly evolving, and so are the tactics of adversaries. According to IBM, the average cost of a data… The post Innovator Spotlight: Cloud Range appeared first on Cyber…
How a CISO Should Brief the Board of Directors
It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply communicate it. Unfortunately, that’s not always the case. This leaves… The post How a CISO Should Brief the Board of…
How Has Video Analytics Enhanced Security and Efficiency?
In recent years, video analytics has significantly transformed the interpretation and utilization of visual data. Through advanced algorithms and artificial intelligence methods, video analytics can perform tasks such as object… The post How Has Video Analytics Enhanced Security and Efficiency?…
The Imperative of Penetration Testing AI Systems
In the modern era of technological advancement, artificial intelligence (AI) is revolutionizing business operations, presenting unparalleled opportunities for efficiency and innovation. However, as AI systems become integral to our business… The post The Imperative of Penetration Testing AI Systems appeared…
Innovator Spotlight: Legit Security
by Dan K. Anderson CEO, CISO, and vCISO With the rise of software supply chain attacks, organizations are under increasing pressure to secure their software development pipelines. According to a… The post Innovator Spotlight: Legit Security appeared first on Cyber…
Safeguarding Corporate Secrets: Best Practices and Advanced Solutions
Do you know where all the secrets are? The probable answer to this might be NO and believe me you are not alone. The advancement of technology has overtaken us…. The post Safeguarding Corporate Secrets: Best Practices and Advanced Solutions…