About fifteen years ago, DevOps radically overhauled the world of software engineering. Previously, the development process had been defined by sometimes maddening delays, as development teams waited for operations teams… The post Looking Past DevOps: AI, ClickOps and Platform Engineering…
Category: Cyber Defense Magazine
The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare
In an alarming revelation, Kaiser Foundation Health Plan reported a data breach impacting over 13 million individuals. For years, there has been an unspoken but critical vulnerability in the healthcare… The post The Kaiser Data Breach Should Be a Wake-Up…
How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert
It doesn’t take much to guess why cybercriminals increasingly target banking applications including emerging fintech and trading as their prime targets – cybercriminals have and continue to be largely financially-motivated…. The post How to Best Secure Banking Applications – Top…
Eliminating the Last Mile Between Security Data and Decision Making
Once upon a time, when we used to have to go to physical stores to get the products we needed, there was no such thing as the retail “last mile”… The post Eliminating the Last Mile Between Security Data and…
Mitigating Data Breaches with AI-Driven Security Solutions
SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes, even those equipped with robust security measures. As cybercriminals become… The post Mitigating Data Breaches with AI-Driven Security Solutions appeared…
The Dual Nature of Ransomware Attacks
Financial Gain and Geopolitical Strategy Ransomware attacks have evolved from mere cybercriminal activities to sophisticated operations serving dual purposes: financial gain for attackers and advancing the geopolitical objectives of adversarial… The post The Dual Nature of Ransomware Attacks appeared first…
The Other Lesson from the XZ Utils Supply-Chain Attack
“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in the case of the recent XZ Utils case, it was… The post The Other Lesson from the XZ Utils Supply-Chain…
Eliminating the Last Mile Between Security Data and Decision Making
Once upon a time, when we used to have to go to physical stores to get the products we needed, there was no such thing as the retail “last mile”… The post Eliminating the Last Mile Between Security Data and…
Artificial Intelligence in 2024
Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so far as to call it the “revolution of work.” Unfortunately,… The post Artificial Intelligence in 2024 appeared first on Cyber…
Unlocking the Power of Behavioral Cloud Native Threat Detection and Response
Behavioral detection and response is not a new concept, and the top three detection and response players command a combined market capitalization of $100 billion. But the rise of cloud… The post Unlocking the Power of Behavioral Cloud Native Threat…
Sheltering from the Cyberattack Storm
As we move towards the summer and the promise of sunnier weather, it’s worth noting that the cybersecurity industry has seen more rain than sunshine recently. A slew of high-profile… The post Sheltering from the Cyberattack Storm appeared first on…
Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management
The massive Snowflake breach disclosed recently, involving hundreds of millions of stolen customer records, is a stark wake-up call for organizations to proactively manage their SaaS security. No doubt the… The post Changing the Passive to Active: Updating SaaS Cybersecurity…
Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management
Single Sign-On (SSO) serves as the linchpin connecting corporate networks, facilitating seamless access to various web applications without the need for repeated login credentials. However, there are several untold challenges… The post Deep Dive: Unveiling the Untold Challenges of Single…
How the Newest Tech Changes Cybersecurity Needs in the Legal Industry
Responsibly Adopting Technology to Improve Law Firm Productivity Lawyers face incredible pressure in their jobs to perform accurately and quickly. Thankfully, technology has been introduced that now allows legal professionals… The post How the Newest Tech Changes Cybersecurity Needs in…
5 Reasons IGA Programs Fail
Identity governance and administration (IGA) is a critical part of modern business. It’s one of the single most important pieces of creating and balancing a productive and secure work environment…. The post 5 Reasons IGA Programs Fail appeared first on…
The First 10 Days of a vCISOs Journey with a New Client
“In a quaint village nestled between rolling hills and dense forests, a young apprentice named Eli was learning to throw pottery from a master potter. On the first day by… The post The First 10 Days of a vCISOs Journey…
Pioneering the New Frontier in AI Consumer Protection and Cyber Defense
In a groundbreaking move, the first state in the U.S. has passed comprehensive legislation aimed at protecting consumers from the potential risks associated with AI. The new Utah Artificial Intelligence… The post Pioneering the New Frontier in AI Consumer Protection…
Digital Identities Have Evolved — Cyber Strategies Should Too
The scale of identity exposure has increased significantly, with over 90% of surveyed organizations reporting an identity-related breach within the last year. These attacks have long-lasting consequences – SpyCloud’s 2024 Identity Exposure Report found… The post Digital Identities Have Evolved — Cyber Strategies Should…
Stop Chasing the AI Squirrel and Patch… Just Patch
In the contemporary technological landscape, the allure of advanced artificial intelligence (AI) systems often captivates the collective imagination of the tech industry and beyond. Stories of deepfakes, such as the… The post Stop Chasing the AI Squirrel and Patch… Just…
Guardians of the Grid: Cyber-Secure Microgrids and the Future of Energy Resilience
The Crucial Role of Cyber-Resilient Microgrids The vulnerability of major metropolitan power grids to natural disasters has become a pressing concern, but mother nature isn’t the only thing threatening our… The post Guardians of the Grid: Cyber-Secure Microgrids and the…