Category: Cyber Defense Magazine

Artificial Intelligence – Supported Internet of Things Security

Transforming digital technology landscape and encompassing global product and service marketplace are crucial challenges of industry 4.0. Novel times have brought something new such as Internet of Things (IoT) and… The post Artificial Intelligence – Supported Internet of Things Security…

The Future of Travel Technology

As technology continues to advance in society, everyday necessities are becoming more accessible by the day. Electronic passports are quickly becoming the answer to modernize travel security. With these new… The post The Future of Travel Technology appeared first on…

Deepfakes: The Cybersecurity Pandora’s Box

The meteoric rise of artificial intelligence (AI) has not only revolutionized industries but also unleashed a Pandora’s box of potential threats. Among the most insidious is the emergence of deepfakes,… The post Deepfakes: The Cybersecurity Pandora’s Box appeared first on…

Innovator Spotlight: Wallarm

The Digital Fortress: How APIs Are Reshaping Cybersecurity in the Age of AI Cybersecurity isn’t just about protecting networks. It’s about understanding the intricate digital highways that connect our most… The post Innovator Spotlight: Wallarm appeared first on Cyber Defense…

Why the Cybersecurity Talent Shortage is a Global Threat

In the era of digital transformation, where data flows across borders and devices, data security is paramount. Cyberattacks are no longer isolated incidents but global challenges that affect economies, industries,… The post Why the Cybersecurity Talent Shortage is a Global…

Countering The Adaptive Playbook of Modern Threat Actors

The cybersecurity landscape has seen a substantial threat vector transformation. While malware and ransomware continue to be relevant threats, a more nuanced class of attacks has gained traction. Over 80%… The post Countering The Adaptive Playbook of Modern Threat Actors…

Top Recommendations for Data Retention and Deletion

The tremendous value that data holds for organizations also comes with the responsibility to properly address its storage, governance, and security. How can businesses tackle this significant task? This article… The post Top Recommendations for Data Retention and Deletion appeared…

Mapping a Future without Cyber Attacks

After countless attacks across a multitude of organizations, the cyber security industry has a fairly good grasp of how adversaries work, the vulnerabilities they take advantage of, and of course,… The post Mapping a Future without Cyber Attacks appeared first…

Protecting CISOs and CSOs in an Era of Personal Liability

Chief Information Security Officers (CISOs) and Chief Security Officers (CSOs) face unprecedented pressures, not only from the evolving threat landscape but also from a legal environment that increasingly seeks to… The post Protecting CISOs and CSOs in an Era of…

Innovator Spotlight: Black Kite

The Invisible Threat: Reimagining Third-Party Risk Management Cybersecurity leaders are drowning in questionnaires while threat actors are swimming in data. The traditional approach to vendor risk management is broken, and… The post Innovator Spotlight: Black Kite appeared first on Cyber…

Innovator Spotlight: WitnessAI

WitnessAI Delivers Security for the AI Era In the AI era, innovation is moving fast. Unfortunately, this means that the risks associated with this movement are too. Malicious activities like… The post Innovator Spotlight: WitnessAI appeared first on Cyber Defense…