Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving the way for cybersecurity innovation…. The post Innovator Spotlight: Traceable AI appeared first on Cyber…
Category: Cyber Defense Magazine
Innovator Spotlight: Reco.ai
As organizations increasingly rely on SaaS applications, the risk of data breaches and unauthorized access grows significantly. According to a 2024 study by the Ponemon Institute, 63% of data breaches… The post Innovator Spotlight: Reco.ai appeared first on Cyber Defense…
Strengthening Your Cybersecurity Insurance Posture with Privileged Access Management (PAM) Solutions
In an era where cyber threats loom larger than ever, businesses are increasingly relying on cyber insurance as a critical component of their risk management strategy. Indeed, the Netwrix 2024 Hybrid… The post Strengthening Your Cybersecurity Insurance Posture with Privileged Access…
Spotlight on Simbian
The race to adopt AI-driven solutions has opened up new opportunities for businesses but has also introduced unprecedented risks in data integrity, compliance, and governance. According to Gartner, 40% of… The post Spotlight on Simbian appeared first on Cyber Defense…
Innovator Spotlight: DNSFilter
In today’s digital age, cybersecurity can often feel like a daunting challenge, with the constant fear of being just one click away from a potential compromise. For Timothy (TK) Keanini,… The post Innovator Spotlight: DNSFilter appeared first on Cyber Defense…
Innovator Spotlight: Gurucul
It was a privilege to meet with Saryu Nayyar, CEO of Gurucul, a prominent woman leader in the cybersecurity industry. As a fellow woman in this field, I was particularly… The post Innovator Spotlight: Gurucul appeared first on Cyber Defense…
The End of the Tunnel Vision: Why Companies Are Ditching VPNs for Zero Trust
Virtual private networks (VPNs) have been the workhorse of secure remote access for decades. They offer a seemingly simple solution: they create a secure tunnel between a user’s device and… The post The End of the Tunnel Vision: Why Companies…
Innovator Spotlight: Cyversity
Interview with Dr. Wade Holmes, member, Cyversity Board of Directors Cyversity is a 501(c)(3) organization whose mission is to achieve the consistent representations of women, underrepresented minorities, and all veterans… The post Innovator Spotlight: Cyversity appeared first on Cyber Defense…
Encryption of Data at Rest: The Cybersecurity Last Line of Defense
Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of cybersecurity, where threats are becoming increasingly sophisticated and pervasive, traditional… The post Encryption of Data at Rest: The Cybersecurity Last…
Striking a Balance Between the Risks and Rewards of AI Tools
With all the recent hype, many may not realize artificial intelligence is nothing new. The idea of thinking machines was first introduced by Alan Turing in the 1950s, and the… The post Striking a Balance Between the Risks and Rewards…
Sheltering From the Cyberattack Storm – Part Two
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate against such an attack. But the cybersecurity storm doesn’t stop… The post Sheltering From the Cyberattack Storm – Part Two…
Strategizing Compliance and Security In AI: A Hands-On Guide for IT Leaders
Navigating the complex web of compliance in the AI era is a formidable challenge, and aligning your organization with existing and emerging legal, ethical, and regulatory standards has never been… The post Strategizing Compliance and Security In AI: A Hands-On…
Innovator Spotlight: ArmorCode
As the world of software development accelerates, the need to secure applications from the earliest stages of development has become critical. The rise of DevSecOps has placed immense pressure on… The post Innovator Spotlight: ArmorCode appeared first on Cyber Defense…
Cyber-Informed Engineering – A New Perspective on OT Security
Cyber-Informed Engineering (CIE) is a new perspective on OT cyber risk – one that is being embraced by OT/engineering teams and IT/enterprise cybersecurity teams alike. This kind of consensus among IT… The post Cyber-Informed Engineering – A New Perspective on OT…
Publisher’s Spotlight: Checkmarx
I was thrilled to catch up with Checkmarx during Black Hat USA 2024. Cloud development transformation has ushered in a host of expanding security challenges: the rising number of point… The post Publisher’s Spotlight: Checkmarx appeared first on Cyber Defense…
Innovator Spotlight: DataBee™
The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…
Publisher’s Spotlight: Horizon3.ai
I was thrilled to catch up with Horizon3.ai during Black Hat USA 2024. Most attackers don’t break in, they log in. CrowdStrike’s 2023 Global Threat Report findings confirm that 71%… The post Publisher’s Spotlight: Horizon3.ai appeared first on Cyber Defense…
Innovator Spotlight: DataBee™
The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…
Innovator Spotlight: Reach Security
Despite the increasing number of cybersecurity tools available, attacks continue to succeed at an alarming rate. Studies show that more than 70% of organizations only utilize 20% or less of… The post Innovator Spotlight: Reach Security appeared first on Cyber…
Innovator Spotlight: SecPod
Vulnerability management has become more critical than ever as the global cost of cybercrime is projected to reach $10.5 trillion annually by 2025. In a world where a cyberattack occurs… The post Innovator Spotlight: SecPod appeared first on Cyber Defense…