By Christopher Salone, Consulting Manager at FoxPointe Solutions Most changes to The New York State Department of Financial Services (NYSDFS) Cybersecurity Regulation, 23 NYCRR Part 500, introduced November 2023, have […] The post A Closer Look at Recent Changes to…
Category: Cyber Defense Magazine
Applied Human Threat Management in Cyber Industry
By Milica D. Djekic The high-tech industry is an extremely emerging environment dealing with the sophisticated and skilled workforce that is recruited to develop an ultimate cutting-edge technology, so far. […] The post Applied Human Threat Management in Cyber Industry…
Cloud Control: Strategic Insights for Securing Your Digital Infrastructure
By Joe Guerra, M.Ed, CASP+, Professor of Cybersecurity, Hallmark University When we talk about the cloud, it’s not just a buzzword; it’s a revolutionary model that has transformed how organizations, […] The post Cloud Control: Strategic Insights for Securing Your…
Cybersecurity 101: Understanding the Basics of Online Protection
By Prem Khatri, Vice President of Operations for Chetu, Inc. In our more and more interconnected world, cybersecurity has turn out to be a paramount challenge for individuals, groups, and […] The post Cybersecurity 101: Understanding the Basics of Online…
Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter
In the fast-moving age of artificial intelligence (AI), cybersecurity is more important than ever before. By Tyler Derr, Chief Technology Officer (CTO), Broadridge In the fast-moving age of artificial intelligence […] The post Cyber Resiliency in The Age Of AI:…
Limits of Automation
How Interactive Sandboxing Can Benefit Your Organization By Vlad Ananin, Technical Writer at Any.Run The current rate and complexity of cyber attacks are making it harder than ever for companies […] The post Limits of Automation appeared first on Cyber…
Why Do Hackers Love Cryptocurrency?
Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to […] The post Why Do Hackers Love Cryptocurrency? appeared first…
Insights from RSA Conference 2024: Transformative Innovations in Cybersecurity
Beyond the Buzz Word AI, the Practical Groundbreaking Stuff By Samridhi Agarwal, Masters Student, CMU My first RSA Conference! Oh, what a blast it was! Attending the RSA Conference has […] The post Insights from RSA Conference 2024: Transformative Innovations…
Cryptographic Protocol Challenges
By Milica D. Djekic The communication protocol is an information exchange method where data are transferred only if two or more networking devices deal with a set of the rules […] The post Cryptographic Protocol Challenges appeared first on Cyber…
Cybersecurity Concerns Facing the 2024 U.S. Elections
By Zac Amos, Features Editor, ReHack Cybersecurity oversights are making infrastructure in the U.S. the most fragile it has been in history. Hackers are constantly developing new strategies to topple […] The post Cybersecurity Concerns Facing the 2024 U.S. Elections…
Crypto Kaleidoscope: Investing in Colorful Coins, Living a Vibrant Life
By Thea Payne In the ever-evolving landscape of cryptocurrency, investors are constantly on the lookout for the next big thing. While Bitcoin and Ethereum dominate the headlines, a new trend […] The post Crypto Kaleidoscope: Investing in Colorful Coins, Living…
CES: AI at the Forefront of Cybersecurity’s Future
Examining the Increased Use of Artificial Intelligence in Cybersecurity By Matthew Taylor, Vice President of Projects and Engineering, MxD The annual Consumer Electronics Show (CES) is the world’s largest consumer […] The post CES: AI at the Forefront of Cybersecurity’s…
Why Millions of Pcs Aren’t Ready for Evolving Cyber Threats
By Achi Lewis, Area VP EMEA for Absolute Security Ongoing global security threats, underpinned by continuous fears by the White House and NCSC, require an urgent call to bolster security defenses […] The post Why Millions of Pcs Aren’t Ready for…
What Individuals Get Wrong About Business Email Compromise
Businesses tend to obsess over business email compromise. This obsession is misguided. Observations from the front lines of combating business email compromise at the SMB scale and what we should […] The post What Individuals Get Wrong About Business Email…
The Cybersecurity Conundrum: Navigating the Challenges with Fewer Resources and Rising Threats
By David Lee, Chief Evangelist and Visionary for Tech Diversity The cybersecurity world is no stranger to adversity, but 2023 presented a unique set of challenges with industry veterans and […] The post The Cybersecurity Conundrum: Navigating the Challenges with…
Tightening Water Cybersecurity is Now Imperative as Biden Administration Issues Urgent Warning to State Leaders
By Robin Berthier, Co-Founder & CEO, Network Perception As the world grapples with escalating cyber threats, the Biden administration has sounded a clarion call to state leaders: bolstering water cybersecurity […] The post Tightening Water Cybersecurity is Now Imperative as…
Relying on the Unreliable
The Hidden Costs of Facial Recognition Technology By Tinglong Dai Bernard T. Ferrari Professor of Business The Carey Business School at Johns Hopkins University With generative AI dominating the tech […] The post Relying on the Unreliable appeared first on…
Keeping Pace with an Evolving Security and Trust Landscape
By Dean Coclin, Senior Director, Digital Trust Specialist, DigiCert It’s clear that 2023 will be remembered as the point that artificial intelligence (AI) stepped out of the shadows and took […] The post Keeping Pace with an Evolving Security and…
How Main Street Businesses Can Up Their Cybersecurity Game
By Mike Caralis, Vice President, Business Markets at Verizon Small businesses are not only essential in keeping Main Street thriving and bustling (I love my local sushi place), but they […] The post How Main Street Businesses Can Up Their…
CTI for M&A
Active dark web Intelligence to aid M&A By Shawn Loveland, COO, Resecurity Every industry-leading company has gone through mergers and acquisitions (M&A) at some point to acquire a competitor, expand […] The post CTI for M&A appeared first on Cyber…