Transforming digital technology landscape and encompassing global product and service marketplace are crucial challenges of industry 4.0. Novel times have brought something new such as Internet of Things (IoT) and… The post Artificial Intelligence – Supported Internet of Things Security…
Category: Cyber Defense Magazine
Geopolitical Cyber Threats in 2024: Navigating Emerging Risks with OSINT (Open-Source Intelligence)
Geopolitical tensions worldwide can have a foreseeable impact on an organisation’s physical operations, but they can also heighten the risk of cyberattacks. These cyber threats are often linked to or… The post Geopolitical Cyber Threats in 2024: Navigating Emerging Risks…
The Future of Travel Technology
As technology continues to advance in society, everyday necessities are becoming more accessible by the day. Electronic passports are quickly becoming the answer to modernize travel security. With these new… The post The Future of Travel Technology appeared first on…
Deepfakes: The Cybersecurity Pandora’s Box
The meteoric rise of artificial intelligence (AI) has not only revolutionized industries but also unleashed a Pandora’s box of potential threats. Among the most insidious is the emergence of deepfakes,… The post Deepfakes: The Cybersecurity Pandora’s Box appeared first on…
Innovator Spotlight: Wallarm
The Digital Fortress: How APIs Are Reshaping Cybersecurity in the Age of AI Cybersecurity isn’t just about protecting networks. It’s about understanding the intricate digital highways that connect our most… The post Innovator Spotlight: Wallarm appeared first on Cyber Defense…
Why VPNs Fail for Hybrid Workforces and The Importance of Privileged Access Management (PAM) To Protect Against Third-Party Risks
Let’s start by being clear that what you need to do to support “hybrid work” versus a “hybrid workforce” isn’t the same. To support hybrid work, you need to secure… The post Why VPNs Fail for Hybrid Workforces and The…
Why the Cybersecurity Talent Shortage is a Global Threat
In the era of digital transformation, where data flows across borders and devices, data security is paramount. Cyberattacks are no longer isolated incidents but global challenges that affect economies, industries,… The post Why the Cybersecurity Talent Shortage is a Global…
Countering The Adaptive Playbook of Modern Threat Actors
The cybersecurity landscape has seen a substantial threat vector transformation. While malware and ransomware continue to be relevant threats, a more nuanced class of attacks has gained traction. Over 80%… The post Countering The Adaptive Playbook of Modern Threat Actors…
Strengthening Cybersecurity in Healthcare: Protecting Patient Data and Ensuring Regulatory Compliance in a Digital Age
Cybersecurity in Healthcare As healthcare increasingly relies on digital technologies, the urgency for robust cybersecurity measures has never been more pronounced. This industry tackles challenges including the security of patient… The post Strengthening Cybersecurity in Healthcare: Protecting Patient Data and…
Why “Time to Patch” Is the Cybersecurity KPI That Matters Most
The way your organization manages its risk tolerance and regulatory factors are key performance indicators (KPIs) for assessing your cybersecurity posture. The most critical KPI is the specific time duration… The post Why “Time to Patch” Is the Cybersecurity KPI…
Top Recommendations for Data Retention and Deletion
The tremendous value that data holds for organizations also comes with the responsibility to properly address its storage, governance, and security. How can businesses tackle this significant task? This article… The post Top Recommendations for Data Retention and Deletion appeared…
How the U.S. Can Strengthen Its Cyber Defenses Against Nation-State Threats
The American power grid is not just the backbone of modern life. It’s a high-value target in our new era of geopolitical conflict. As foreign adversaries expand their cyber capabilities,… The post How the U.S. Can Strengthen Its Cyber Defenses…
Beyond Tick Boxes: An Auditor’s Perspective on Information Security Compliance
Introduction As cyber threats evolve and regulatory requirements tighten, businesses face increasing pressure to protect their sensitive data and strengthen security practices. This blog will give you some helpful insights… The post Beyond Tick Boxes: An Auditor’s Perspective on Information…
Why Outdated Corporate Networks Are Analogous to the Aging U.S. Highway System
“Necessity is the mother of invention” has never been more fitting—whether you’re talking about America’s post-WWII highway boom or the evolution of enterprise networks during the internet revolution. The U.S…. The post Why Outdated Corporate Networks Are Analogous to the…
Mapping a Future without Cyber Attacks
After countless attacks across a multitude of organizations, the cyber security industry has a fairly good grasp of how adversaries work, the vulnerabilities they take advantage of, and of course,… The post Mapping a Future without Cyber Attacks appeared first…
Deepfakes at the Gate: How Fake Job Applicants Are Becoming a Serious Cyber Threat
In recent months, the hiring process has become a new attack surface. Cybercriminals are no longer just spoofing emails or exploiting software flaws—they’re applying for jobs. In the last year,… The post Deepfakes at the Gate: How Fake Job Applicants…
Protecting CISOs and CSOs in an Era of Personal Liability
Chief Information Security Officers (CISOs) and Chief Security Officers (CSOs) face unprecedented pressures, not only from the evolving threat landscape but also from a legal environment that increasingly seeks to… The post Protecting CISOs and CSOs in an Era of…
Innovator Spotlight: Black Kite
The Invisible Threat: Reimagining Third-Party Risk Management Cybersecurity leaders are drowning in questionnaires while threat actors are swimming in data. The traditional approach to vendor risk management is broken, and… The post Innovator Spotlight: Black Kite appeared first on Cyber…
Expert Spotlight: Koushik Anand on IAM and PAM Excellence at Enterprise Scale
By Gary Miliefsky, Publisher With more than 80% of breaches involving stolen or misused credentials, identity is the control point that matters most. Koushik Anand helps enterprises secure digital identities… The post Expert Spotlight: Koushik Anand on IAM and PAM…
Innovator Spotlight: WitnessAI
WitnessAI Delivers Security for the AI Era In the AI era, innovation is moving fast. Unfortunately, this means that the risks associated with this movement are too. Malicious activities like… The post Innovator Spotlight: WitnessAI appeared first on Cyber Defense…