By Stephen Chin, VP of Developer Relations, JFrog What do autonomous driving and software (SW) development have in common? At first glance, not much. But when taking a closer look […] The post AI in DevSecOps: Moving from A Co-Pilot…
Category: Cyber Defense Magazine
Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game
If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure across all sectors, and “be resilient” to the constant onslaught […] The post Prevention Strategies Inevitably Become a Constant Cat-and-Mouse…
AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users
Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at Jumio While AI-driven automation brings benefits, it also gives hackers […] The post AI-Enhanced Identity Fraud: A Mounting Threat to…
AI: The Human Touch in Cybersecurity Recruitment
Harnessing the Digital Scout for Cybersecurity’s Future By Darrin Straff, Senior Staffing Consultant, NinjaJobs Introduction: In the digital age, where cybersecurity threats are ever-evolving, AI’s role in strengthening our defenses […] The post AI: The Human Touch in Cybersecurity Recruitment…
Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors
A Vital Set of Cybersecurity Best Practices By John Funk, Creative Consultant, SevenAtoms A new cybersecurity mandate being rolled out by the Pentagon has implications that reach beyond the military […] The post Why Cybersecurity Maturity Model Certification (CMMC) Matters…
The Tech Jobs That AI Will Not Disrupt
By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to […] The post The Tech Jobs That AI Will Not…
3 New Risks That CISOs Will Face in 2024
By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere are increasingly vigilant about how their data is being gathered […] The post 3 New Risks That CISOs Will Face…
How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance
Steps To Implement Cyber Controls and Processes By Juliana Spofford, General Counsel and Chief Privacy Officer, Aidentified In today’s tech world, it is often difficult to determine which businesses you […] The post How Small and Mid-Sized Businesses Can Achieve…
Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments
By Victor Atkins, Director | Cybersecurity, 1898 & Co. The rise in the age of digitalization has provided numerous benefits for modern society, from the ability to conduct a telehealth […] The post Closing the Gap: Safeguarding Critical Infrastructure’s IT…
The Crumbling Castle
By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy involved building a strong perimeter around the corporate network, like […] The post The Crumbling Castle appeared first on Cyber…
The Cybersecurity Bridge: A Necessary Connection for IT and Communications
By Jeff Hahn, principal of Hahn, and Kenneth Holley, Principal and chairman of Silent Quadrant With the increasing unpredictability and sophistication of cyber threats, IT and communications departments must align […] The post The Cybersecurity Bridge: A Necessary Connection for…
Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines
SEC’s New Guidelines Prompt Proactive Cyber Risk Management By Meghan Maneval, Director of Technical Product Management at RiskOptics Recently, the Securities and Exchange Commission (SEC) adopted rules about the handling […] The post Three Things to Know About the New…
Striking The Right Balance: Cloud and Cyber Priorities for SMEs
By Mark Allen, Head of cyber, CloudCoCo As small and medium-sized enterprises (SMEs) embark on their digitalization journey, they face a crucial dilemma: Should they prioritize the adoption of cloud […] The post Striking The Right Balance: Cloud and Cyber…
Shifting Left Means Shifting Smart: Managing Software Risk With ASPM
By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up software delivery, security practices have had to evolve. Development teams […] The post Shifting Left Means Shifting Smart: Managing Software…
Protecting Critical Infrastructure from Cyber Attack
The enemy is using cyber weapons that are hard to track and even harder to fully attribute to an adversary, companies need to act now By Richard Staynings, Chief Security […] The post Protecting Critical Infrastructure from Cyber Attack appeared…
Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead
By Craig Burland, CISO, Inversion6 In a world driven by technology, innovation and rapid change, companies often find themselves touting the mantra of “ruthless prioritization.” The idea sounds pragmatic: with […] The post Ruthless Prioritization Is a Myth: Aim For…
Ditch the Worry – Switch to Secure WhatsApp Alternative
By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it has been designed as a personal and social messaging service. […] The post Ditch the Worry – Switch to Secure…
What the Government Can Learn from the Private Sector in Pursuit of Zero Trust
By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order on Improving the Nation’s Cybersecurity, outlining one of the administration’s […] The post What the Government Can Learn from the…
Protecting Your Business and Personal Data
By Brian Lonergan, VP of Product Strategy, Identity Digital October celebrated National Cybersecurity Awareness Month (NCSAM), a time when public and private sectors, along with tribal communities, join forces to […] The post Protecting Your Business and Personal Data appeared…
Navigating Secure Adoption of AI Across Government and Connected Infrastructure
By Gaurav (G.P.) Pal, Founder and CEO, stackArmor This year, artificial intelligence has exploded in popularity across all sectors and industries — including the federal government. AI is being used […] The post Navigating Secure Adoption of AI Across Government…