Category: Cyber Defense Magazine

Innovator Spotlight: Traceable AI

Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving the way for cybersecurity innovation…. The post Innovator Spotlight: Traceable AI appeared first on Cyber…

Innovator Spotlight: Reco.ai

As organizations increasingly rely on SaaS applications, the risk of data breaches and unauthorized access grows significantly. According to a 2024 study by the Ponemon Institute, 63% of data breaches… The post Innovator Spotlight: Reco.ai appeared first on Cyber Defense…

Spotlight on Simbian

The race to adopt AI-driven solutions has opened up new opportunities for businesses but has also introduced unprecedented risks in data integrity, compliance, and governance. According to Gartner, 40% of… The post Spotlight on Simbian appeared first on Cyber Defense…

Innovator Spotlight: DNSFilter

In today’s digital age, cybersecurity can often feel like a daunting challenge, with the constant fear of being just one click away from a potential compromise. For Timothy (TK) Keanini,… The post Innovator Spotlight: DNSFilter appeared first on Cyber Defense…

Innovator Spotlight: Gurucul

It was a privilege to meet with Saryu Nayyar, CEO of Gurucul, a prominent woman leader in the cybersecurity industry. As a fellow woman in this field, I was particularly… The post Innovator Spotlight: Gurucul appeared first on Cyber Defense…

Innovator Spotlight: Cyversity

Interview with Dr. Wade Holmes, member, Cyversity Board of Directors Cyversity is a 501(c)(3) organization whose mission is to achieve the consistent representations of women, underrepresented minorities, and all veterans… The post Innovator Spotlight: Cyversity appeared first on Cyber Defense…

Encryption of Data at Rest: The Cybersecurity Last Line of Defense

Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of cybersecurity, where threats are becoming increasingly sophisticated and pervasive, traditional… The post Encryption of Data at Rest: The Cybersecurity Last…

Sheltering From the Cyberattack Storm – Part Two

In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate against such an attack. But the cybersecurity storm doesn’t stop… The post Sheltering From the Cyberattack Storm – Part Two…

Innovator Spotlight: ArmorCode

As the world of software development accelerates, the need to secure applications from the earliest stages of development has become critical. The rise of DevSecOps has placed immense pressure on… The post Innovator Spotlight: ArmorCode appeared first on Cyber Defense…

Publisher’s Spotlight: Checkmarx

I was thrilled to catch up with Checkmarx during Black Hat USA 2024.  Cloud development transformation has ushered in a host of expanding security challenges: the rising number of point… The post Publisher’s Spotlight: Checkmarx appeared first on Cyber Defense…

Innovator Spotlight: DataBee™

The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…

Publisher’s Spotlight: Horizon3.ai

I was thrilled to catch up with Horizon3.ai during Black Hat USA 2024.  Most attackers don’t break in, they log in. CrowdStrike’s 2023 Global Threat Report findings confirm that 71%… The post Publisher’s Spotlight: Horizon3.ai appeared first on Cyber Defense…

Innovator Spotlight: DataBee™

The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…

Innovator Spotlight: Reach Security

Despite the increasing number of cybersecurity tools available, attacks continue to succeed at an alarming rate. Studies show that more than 70% of organizations only utilize 20% or less of… The post Innovator Spotlight: Reach Security appeared first on Cyber…

Innovator Spotlight: SecPod

Vulnerability management has become more critical than ever as the global cost of cybercrime is projected to reach $10.5 trillion annually by 2025. In a world where a cyberattack occurs… The post Innovator Spotlight: SecPod appeared first on Cyber Defense…