By Héctor Guillermo Martínez, President of GM Sectec With the release of a new version of the PCI DSS 4.0 Payment Card Industry Data Security Standard, the safety and security […] The post Accelerate the path to PCI DSS 4.0…
Category: Cyber Defense Magazine
Real Time Exposure Detection Is the Missing Element of Every Cybersecurity Strategy
Detecting threats and vulnerabilities in real-time is crucial for an effective cybersecurity strategy to protect against cybercriminals. By Or Shoshani, CEO and Co-founder, Stream Security Cybersecurity teams are often at […] The post Real Time Exposure Detection Is the Missing…
QR Code Phishing Attacks: Threat Actors Are Now Shopping Online with You
Olesia Klevchuk, Director of Email Protection at Barracuda, discusses the prevalence of QR code phishing attacks and how cybercriminals are utilizing quishing to exploit data, download malware, compromise personal devices, […] The post QR Code Phishing Attacks: Threat Actors Are…
Protecting Data in The Final Stretch of The Supply Chain
Building a Secure Last Mile for Global Commerce By Dan O’Toole, Chairman & CEO, Arrive Navigating the Last Mile: Securing the Final Stretch of the Supply Chain In the rapidly […] The post Protecting Data in The Final Stretch of…
Passwords In the Air
By Gautam Hazari, Chief Technology Officer, Sekura.id Imagine, you are sitting in a café, sipping the skillfully crafted coffee by the barista, with your laptop placed on the table in […] The post Passwords In the Air appeared first on…
Organizations Are Shifting Ransomware Defense Tactics, But Malware Is Still the Problem
By Trevor Hilligoss, Senior Director of Security Research at SpyCloud Ransomware attacks are a fact of life – over 72% of global businesses have been impacted by ransomware in 2023. This number […] The post Organizations Are Shifting Ransomware Defense Tactics, But…
Open AI Exec Warns AI is “Extremely Addictive,” Humanity Could Become “Enslaved”
By Sai Mattapalli and Rohan Kalahasty, Co-Founders — Vytal.ai The idea of technology going wrong and turning on its creators is not new. More than 200 years ago, Mary Shelley […] The post Open AI Exec Warns AI is “Extremely…
Manufacturing on the Cyber Frontlines: Enhancing Cybersecurity on the Factory Floor
By Berardino Baratta, CEO, MxD Manufacturing in the United States is changing. Today’s factory floors are a far cry from those we saw in 1980s movies – dark, hostile environments […] The post Manufacturing on the Cyber Frontlines: Enhancing Cybersecurity…
Making Our Infrastructure Resilient: 5 Priorities for Security R&D
By Saurabh Amin, Professor of Civil and Environmental Engineering PI, Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cyberattacks are undoubtedly on the rise; as of September 2023, […] The post Making Our Infrastructure Resilient: 5 Priorities for…
Key Differences in Securing OT & IT Environments
Critical cybersecurity components every security leader must know amid the convergence of IT & OT By Joe O’Donnell, EVP of Corporate Development, Cyolo The increasing cyberattacks against critical sectors, in […] The post Key Differences in Securing OT & IT…
Institutionalizing Awareness to Stop Cyberattacks
By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…
Implementing ZTA: Benefits and Best Practices
By Eric Sugar, President, ProServeIT In an era defined by the relentless advance of digitalization and the ever-expanding interconnectivity of industrial systems, the realm of cybersecurity has been thrust into […] The post Implementing ZTA: Benefits and Best Practices appeared…
Attackers Keep Evolving: Lessons from Expel’s Q2 2023 Quarterly Threat Report
Cyberdefenders plug the holes, so attackers innovate to try to stay ahead. By Aaron Walton, Threat Intel Analyst, Expel Most cyberattackers don’t try to reinvent the wheel: as long as […] The post Attackers Keep Evolving: Lessons from Expel’s Q2…
What are the Essential Skills for Cyber Security Professionals in 2024?
Where should you invest time and resources to drive success when it comes to the must-have skills and tools for senior leaders in the industry. By Sarah Gilchriest, Chief People […] The post What are the Essential Skills for Cyber…
Enhancing The Nation’s Cybersecurity Workforce
Supporting Critical Infrastructure Resilience with Skill-Based Labor By Randall Sandone, Executive Director, Critical Infrastructure Resilience Institute at The Grainger College of Engineering at the University of Illinois Urbana-Champaign “With almost […] The post Enhancing The Nation’s Cybersecurity Workforce appeared first…
Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy
WHY DIGITAL TRUST MATTERS By Lalit Ahluwahli, CEO & Founder, DigitalXForce & iTrustXForce We all know that cybersecurity and privacy are becoming more and more critical with digital transformation. The […] The post Why Digital Trust Has Become More Critical…
Does Zero Trust Improve Productivity?
By Zac Amos, Features Editor, ReHack Zero trust has gained significant attention as an effective approach to secure digital assets. It’s a security framework that’s also believed to impact employee […] The post Does Zero Trust Improve Productivity? appeared first…
Cybersecurity Threats in Global Satellite Internet
By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the […] The post Cybersecurity Threats in Global Satellite Internet appeared…
Classic Information Security Management Errors
How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as an information security expert, I encounter numerous errors, many of […] The post Classic Information Security Management Errors appeared first…
Prioritizing Action After the Threat Headlines
By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially cybersecurity professionals, know the feeling. Minutes – sometimes seconds – […] The post Prioritizing Action After the Threat Headlines appeared…