Category: Cyber Defense Magazine

When Security Collides with Customer Impatience

How Biographic and Biometric Information Work as a Team to Solve the Problem By Raj Ananthanpillai, CEO, Trua Online customers don’t take long to get fidgety. They want their transactions […] The post When Security Collides with Customer Impatience appeared…

DevSecOps Practices for a Secure Cloud

How to start ahead of the curve? By Vishakha Sadhwani, Customer Engineer, Google Cloud In today’s rapidly evolving technological landscape, a strong cultural practice like DevSecOps is essential. It empowers […] The post DevSecOps Practices for a Secure Cloud appeared…

Vendors Beware of the Cybersecurity Audit

By Caroline McCaffery, Co-Founder and CEO of ClearOPS Introduction to Vendor Management Why does every license agreement and data protection addendum, suddenly, include a right for the buyer to perform […] The post Vendors Beware of the Cybersecurity Audit appeared…

Three Key Threats Fueling the Future of Cyber Attacks

By Rishi Baviskar, Global Head of Cyber Risk Consulting at Allianz Commercial Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat […] The post Three Key Threats Fueling the Future of…

The Quantum Shift

Preparing Cybersecurity for a New Era By Sercan Okur, VP of Technology, NextRay In contrast to my previous pieces, I intend to commence this piece with a hypothetical calamitous situation. […] The post The Quantum Shift appeared first on Cyber…

CISO Life: the Good, the Bad, the Ugly

What type of things can go wrong with Senior Leadership, the Org, Legal, HR, etc. by Dan K. Anderson In today’s hectic Cyber world, the role of CISO continues to […] The post CISO Life: the Good, the Bad, the…

Government Communications: The Threats

By Nicole Allen, Marketing Manager at Salt Communications In an age where information flows freely and rapidly, government communications have never been more vulnerable. The digital age has ushered in […] The post Government Communications: The Threats appeared first on…

SASE and Zero Trust: A Powerful Combination

By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Gone are the days when network security resembled a medieval castle. It was protected by a robust drawbridge and moat. In our […] The post SASE and Zero Trust: A Powerful Combination…

A 5-Minute Refresher to Cryptography

 (featuring Alice and Bob) by Rajvi Shroff It’s an age-old question. Alice wants to send a message to Bob. But how can Alice send it to Bob without Eve, the […] The post A 5-Minute Refresher to Cryptography appeared first…