Category: Cyber Defense Magazine

Benefits of Network Monitoring Systems

Maintaining a resilient, secure, and efficient network infrastructure is more important than ever. Network monitoring systems, which encompass both hardware and software tools, play a pivotal role in achieving this… The post Benefits of Network Monitoring Systems appeared first on…

Autonomous, Deterministic Security for Mission-Critical IOT Systems

Mission-Critical Iot Systems: Cybersecurity Principles In creating an effective cybersecurity strategy for IoT systems, software architects examine obstacles that limit the security options for their target systems. To deliver a… The post Autonomous, Deterministic Security for Mission-Critical IOT Systems appeared…

The Unsolvable Problem: XZ and Modern Infrastructure

The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst up at night. The recent XZ backdoor attack is finally… The post The Unsolvable Problem: XZ and Modern Infrastructure appeared…

A Cloud Reality Check for Federal Agencies

The move to cloud is not slowing down – spending by Federal civilian agencies on cloud computing could reach $8.3 billion in Fiscal Year (FY) 2025. But despite years of guidance (from… The post A Cloud Reality Check for Federal Agencies appeared…

A CISO’s Guide to Managing Risk as the World Embraces AI

As Generative AI becomes more deeply integrated into our digital landscape, organizations face a growing need to manage application, technology, and cybersecurity risks effectively. The rapid evolution of AI technology… The post A CISO’s Guide to Managing Risk as the…

BYTE BY BYTE

In an era where digital transformation is reshaping healthcare, dental practices find themselves caught in a perfect storm of cybersecurity vulnerabilities. As ransomware attacks surge across the healthcare sector, dental… The post BYTE BY BYTE appeared first on Cyber Defense…

The Initial Engagement Process for Contracting with a vCISO

Introduction In today’s fast-paced digital world, organizations face a myriad of cybersecurity challenges that demand expert guidance and strategic oversight. Enter the Virtual Chief Information Security Officer (vCISO), a role… The post The Initial Engagement Process for Contracting with a…

The Evolution of Cloud Strategy: Beyond “Cloud First”

In the rapidly evolving digital landscape, the mantra “Cloud First” is becoming a relic of the past. Today, organizations are recognizing that mere digital transformation does not automatically translate into… The post The Evolution of Cloud Strategy: Beyond “Cloud First”…

Supply Chains Make Insider Threat Defense More Complex

Regular insider threats are bad enough — conventional security tools don’t detect them, they know where it’ll hurt to hit, and management doesn’t suspect them. Unfortunately, insider supply chain threats… The post Supply Chains Make Insider Threat Defense More Complex…

Securing AI Models – Risk and Best Practices

Generative AI (Artificial Intelligence) has turned out to be a game changer after the introduction of ChatGPT, DALL-E, Bard, Gemini, GitHub Copilot etc. in 2022 and 2023 [1]. The majority… The post Securing AI Models – Risk and Best Practices…

Innovator Spotlight: Sumo Logic

The rapid adoption of cloud and digital services is driving exponential data growth, creating fragmented visibility and operational silos across Dev, Sec, and Ops teams. According to the IDC, the… The post Innovator Spotlight: Sumo Logic appeared first on Cyber…

Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations

In today’s dynamic threat landscape, security leaders are under constant pressure to make informed choices about which solutions and strategies they employ to protect their organizations. The “MITRE Engenuity ATT&CK Evaluations:… The post Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations…

Maintaining File Security While Working Remotely

These days remote workers in home offices using residential WiFi must maintain a similar security posture as a full-on corporation while working with other remote stakeholders, clients, and partners anywhere… The post Maintaining File Security While Working Remotely appeared first…

How Ransomware Jeopardizes Healthcare Organizations

Security challenges in the healthcare sector continue to grow as connected assets and attack surfaces expand. Organizations in any sector face financial ramifications in the aftermath of a successful attack,… The post How Ransomware Jeopardizes Healthcare Organizations appeared first on…

High Performance Software Defined Receivers

Introduction As cybersecurity challenges grow more complex, the tools we use to protect data and communications are also advancing. Among these tools, high-performance software defined receivers (SDRs) with tuning ranges… The post High Performance Software Defined Receivers appeared first on…

Biometrics in the Cyber World

by Victoria Hargrove, Reporter, CDM In today’s society, digital threats are happening at a consistent and concerning rate. Traditional authentication methods no longer stand a chance against preventing these threats…. The post Biometrics in the Cyber World appeared first on…

5 Essential Features of an Effective Malware Sandbox

Malware sandboxes offer a safe and controlled environment to analyze potentially harmful software and URLs. However, not all sandboxes incorporate features that are essential for proper analysis. Let’s look at… The post 5 Essential Features of an Effective Malware Sandbox…

How to maximize cybersecurity ROI

Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf of Cynet in October 2024…. The post How to maximize cybersecurity ROI appeared first on…

Innovator Spotlight: Push Security

Identity is the new perimeter. Attackers are no longer hacking into your organization—they’re logging in with compromised credentials. Push Security is countering this shift with a browser-based identity security platform… The post Innovator Spotlight: Push Security appeared first on Cyber…

The AT&T Phone Records Stolen

In today’s digital age, the importance of cybersecurity must be re-balanced. With increasing cyberattacks and data breaches, organizations must prioritize protecting their customers’ sensitive information. Unfortunately, AT&T has recently fallen… The post The AT&T Phone Records Stolen appeared first on…

Cyber Threat Intelligence (CTI) for Supply Chain Monitoring

Executive summary Many companies face various risks across their supply chain, which are increasing, especially cyber threats. Studies indicate that nearly all companies have at least one supplier that has… The post Cyber Threat Intelligence (CTI) for Supply Chain Monitoring…

Overcoming Cybersecurity Integration Roadblocks

As a CEO working alongside cybersecurity product companies, I know that integration & the connectors are necessary evil for cyber security products companies. For companies in our industry, seamless, reliable… The post Overcoming Cybersecurity Integration Roadblocks appeared first on Cyber…

Spotlight on Dashlane

Dashlane is the leading enterprise credential manager that secures access and proactively protects against breaches. In an era where painfully simple password spraying and phishing attacks are still the primary… The post Spotlight on Dashlane appeared first on Cyber Defense…

Spotlight on Onyxia

Onyxia’s Cybersecurity Management Platform delivers predictive insights and data intelligence that allow CISOs to gain a complete view of their cybersecurity program performance, achieve organizational compliance, increase security stack efficiency,… The post Spotlight on Onyxia appeared first on Cyber Defense…

Innovator Spotlight: Cloud Range

by Dan K. Anderson CEO, CISO, and vCISO The cybersecurity landscape is rapidly evolving, and so are the tactics of adversaries. According to IBM, the average cost of a data… The post Innovator Spotlight: Cloud Range appeared first on Cyber…

How a CISO Should Brief the Board of Directors

It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply communicate it. Unfortunately, that’s not always the case. This leaves… The post How a CISO Should Brief the Board of…

How Has Video Analytics Enhanced Security and Efficiency?

In recent years, video analytics has significantly transformed the interpretation and utilization of visual data. Through advanced algorithms and artificial intelligence methods, video analytics can perform tasks such as object… The post How Has Video Analytics Enhanced Security and Efficiency?…

The Imperative of Penetration Testing AI Systems

In the modern era of technological advancement, artificial intelligence (AI) is revolutionizing business operations, presenting unparalleled opportunities for efficiency and innovation. However, as AI systems become integral to our business… The post The Imperative of Penetration Testing AI Systems appeared…

Innovator Spotlight: Legit Security

by Dan K. Anderson CEO, CISO, and vCISO With the rise of software supply chain attacks, organizations are under increasing pressure to secure their software development pipelines. According to a… The post Innovator Spotlight: Legit Security appeared first on Cyber…

Securing E-commerce

E-commerce is poised to account for over 20% of global purchases by 2024. This surge is fueled by a confluence of factors: the expansion of online product offerings, consumer pursuit of discounts,… The post Securing E-commerce appeared first on Cyber Defense Magazine.…

Securing E-commerce

E-commerce is poised to account for over 20% of global purchases by 2024. This surge is fueled by a confluence of factors: the expansion of online product offerings, consumer pursuit of discounts,… The post Securing E-commerce appeared first on Cyber Defense Magazine.…

Team-Based Training and the Power of Simulation

In the constantly evolving realm of cybersecurity, it is critical for incident responders to be prepared and effective. As cyber threats grow more complex, the training approaches for these defenders… The post Team-Based Training and the Power of Simulation appeared…

Innovator Spotlight: Interpres Security

In the current cybersecurity landscape, the focus has shifted from merely managing vulnerabilities to strategically orchestrating defenses against targeted threats. Organizations are increasingly struggling to optimize their security posture amidst… The post Innovator Spotlight: Interpres Security appeared first on Cyber…

Innovator Spotlight: Concentric

Data security is more critical than ever as organizations manage vast amounts of sensitive information across cloud and on-premises environments. According to a 2023 report by Varonis, over 53% of… The post Innovator Spotlight: Concentric appeared first on Cyber Defense…

Innovator Spotlight: Keepnet Labs

Keepnet specializes in addressing human factors of security through innovative security awareness training and phishing simulation tools. This article highlights the significant findings of their 2024 Vishing (Voice Phishing) Response… The post Innovator Spotlight: Keepnet Labs appeared first on Cyber…

Zero-Trust Endpoint Security

Zero-Trust Endpoint Security: How a Preventive Approach Can Limit Your Endpoint Attack Surface Endpoint security has become more critical than ever in today’s rapidly evolving threat landscape. As enterprises become… The post Zero-Trust Endpoint Security appeared first on Cyber Defense…

The Unsolvable Problem: XZ and Modern Infrastructure

The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst up at night. The recent XZ backdoor attack is finally… The post The Unsolvable Problem: XZ and Modern Infrastructure appeared…

Publishers Spotlight: Proofpoint

I was thrilled to catch up with Proofpoint top executives, recently, to discuss Proofpoint’s AI-powered solution and critical issues including data leakage and insider risks. In an era where digital… The post Publishers Spotlight: Proofpoint appeared first on Cyber Defense…

AI-Powered Fraud Detection Systems for Enhanced Cybersecurity

Artificial intelligence (AI) has many applications in cybersecurity. Automated fraud detection is one of the most impactful of these use cases. Fraud can be difficult for humans to spot, but… The post AI-Powered Fraud Detection Systems for Enhanced Cybersecurity appeared…

Transforming Security Testing With AI: Benefits and Challenges

Security testing plays a critical role in ensuring that applications are protected against vulnerabilities and attacks. In times when cyber attacks like data breaches and ransomware are rising, security testing… The post Transforming Security Testing With AI: Benefits and Challenges…

NextGen Identity Management

Federal agencies face a pivotal cybersecurity challenge: prevent unauthorized entities from accessing systems and facilities, while granting authorized federal employees and contractors access commensurate with verified need. Two factors complicate… The post NextGen Identity Management appeared first on Cyber Defense…

Strengthening Security

Integrated Governance, Risk, and Compliance Is Critical Business executives in all sectors place a high premium on security in the quickly changing digital landscape of today. Security is no longer… The post Strengthening Security appeared first on Cyber Defense Magazine.…

Innovator Spotlight: Cyberseconomics

In today’s rapidly evolving digital landscape, fear, uncertainty, and doubt have become the dominant emotions for many organizations grappling with cybersecurity. The constant reports of data breaches, ransomware attacks, and… The post Innovator Spotlight: Cyberseconomics appeared first on Cyber Defense…

Innovator Spotlight: Zendata

In today’s digital landscape, data security and privacy have become top priorities for organizations of all sizes. According to a 2023 report by IBM, the average cost of a data… The post Innovator Spotlight: Zendata appeared first on Cyber Defense…

Worried about Insider Risk? Pay More Attention to Offboarding

Discussions of insider risk inevitably conjure images of disgruntled IT employees stealing sensitive data from the comfort of an air-conditioned office. However, insider risk is significantly more complex, and any… The post Worried about Insider Risk? Pay More Attention to…

The Role of Intelligence in Cyber Threat Response

1) The Reality of Cybersecurity Threats and Response As technology develops and digitalization progresses, cybersecurity threats are becoming increasingly diverse and sophisticated. As a result, responding to these cybersecurity threats… The post The Role of Intelligence in Cyber Threat Response…

Innovator Spotlight: Concentric AI

It’s not enough for companies to just discover and monitor sensitive data. They need tools that can proactively fix any security issues to prevent data loss and meet compliance standards…. The post Innovator Spotlight: Concentric AI appeared first on Cyber…

How Automation Can Help Security Policy Optimization

One of the recurring questions we hear from network security leaders is “why aren’t our security policies optimized?” The answer, however, is far from simple. The truth is that a… The post How Automation Can Help Security Policy Optimization appeared…