By Dan Hopkins, VP of Engineering at StackHawk IT modernization and digital transformation initiatives, combined with faster software deployment lifecycles, has caused an exponential increase in the size and scale […] The post Zombie APIs: The Scariest Threat Lurking in…
Category: Cyber Defense Magazine
The Crucial Need for a Secure Software Development Lifecycle (SSDLC) in Today’s Digital Landscape
By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation. “Securing the software delivery pipeline is as important as securing the software that is […] The post The Crucial Need for a Secure Software…
Beyond Passwords: AI-Enhanced Authentication in Cyber Defense
By Kathleen Dcruz Why all the noise about artificial intelligence? Now more than ever, AI is becoming part of our lives faster than you could imagine. The question that begs, […] The post Beyond Passwords: AI-Enhanced Authentication in Cyber Defense…
AI And Ad Fraud: Growing Risks for Marketers Using Google’s AI-Based Advertising Campaigns
Google’s Performance Max (PMax) – AI has ignited a flurry of concerns relating to data protection and security, and organisations must act now to prevent further damaging losses. By Mathew […] The post AI And Ad Fraud: Growing Risks for…
Bolster an Organizational Cybersecurity Strategy with External Data Privacy
Enterprise threat protection is missing this critical component By Harry Maugans, CEO, Privacy Bee Companies fight hard to find, cajole and incentivize top talent to run their business. They also […] The post Bolster an Organizational Cybersecurity Strategy with External…
An Age-by-Age Guide to Online Safety for Kids
By Chelsea Hopkins, Social Media Manager, Fasthosts The internet is a fast-changing world of information that allows kids to play, create, browse, and engage with different people from all corners […] The post An Age-by-Age Guide to Online Safety for…
Your #1 Security Initiative in 2024 Should be Operational Resilience
The cyber world is filled with lots of scary threats and new buzzwords, none of them bigger than AI. As boards, CEOs, and security leadership teams decide where to put […] The post Your #1 Security Initiative in 2024 Should…
Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds
Digital transformation has urged organizations across various industries to adopt multi-cloud strategies. They need to find the right balance for security and growth. By Michael Rostov, Entrepreneur and Co-Founder at […] The post Overcoming Multi-Cloud Security Challenges: The Power of…
Artificial Deception: The State Of “AI” In Defense and Offense
By Ken Westin, Field CISO, Panther Labs If you have seen any of my talks, I often say that the infosec industry wouldn’t exist without deception. Although I’ve seen enough […] The post Artificial Deception: The State Of “AI” In…
Master Security by Building on Compliance with A Risk-Centric Approach
By Meghan Maneval, Vice President of Product Strategy and Evangelism, RiskOptics In recent years, a confluence of circumstances has led to a sharp rise in IT risk for many organizations. […] The post Master Security by Building on Compliance with…
Charting a Trustworthy AI Journey
Sound cybersecurity principles for responsible generative AI innovation By Lisa O’Connor, Managing Director—Accenture Security, Cybersecurity R&D, Accenture Labs As companies turn to generative AI to transform business operations, traditional notions […] The post Charting a Trustworthy AI Journey appeared first…
Understanding the Escalating Threat of Web DDoS Tsunami Attacks
By Uri Dorot, Senior Security Solutions Lead at Radware Whether it’s hacktivists conducting cyberwarfare or ransom-seeking criminals targeting vulnerable firms in financial services, retail, energy, or transportation, a new breed […] The post Understanding the Escalating Threat of Web DDoS…
As Digital Payments Explode in Popularity, Cybercriminals are Taking Notice
By Norman Comstock, Managing Director, and Luke Nelson, Managing Director, Cybersecurity Solutions, UHY Consulting With $54 trillion in payments flowing through the world’s leading transaction avenues, the payments space is […] The post As Digital Payments Explode in Popularity, Cybercriminals…
Why Continuous Training Must Come Before The AI-driven SDLC
By Mike Burch, Director of Application Security, Security Journey Despite the hype, generative AI is unlikely to transform the world. But there are sectors where it could significantly disrupt the […] The post Why Continuous Training Must Come Before The…
The Future of Modern Networks Is Automated Threat Intelligence.
By Amit Dhingra, Executive Vice President of Network Services, NTT During the past three years, the enterprise cybersecurity environment has changed drastically. Security threats now come from any number of […] The post The Future of Modern Networks Is Automated…
The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of
By Ivan Shefrin, Executive Director, Managed Security Services, Comcast Business The rise of DDoS attacks is old news. Now, these attacks are becoming more dangerous, targeted, and detrimental as they […] The post The State of DDoS Attacks: Evolving Tactics…
The U. S. Cyber Trust Mark: Providing Assurance That IoT Devices Are Trustworthy
By Mike Nelson, Vice President of Digital Trust, DigiCert It’s safe to say that in 2023, the Internet of Things (IoT) train has left the station and is full speed […] The post The U. S. Cyber Trust Mark: Providing…
URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes
By Zack Schwartz, Chief Revenue Officer, Trustifi As a provider of cybersecurity, we notice when certain trends begin to emerge, judging mostly from the interest and response levels that we […] The post URL Hunting: Proactive Cybersecurity Designed to Improve…
The Digital Transformation Blueprint: A Mosaic of Technology, Collaboration, And Security
By Ani Chaudhuri, CEO, Dasera In the Digital Age, businesses confront a dynamic landscape, compelled by the allure of innovation while wary of potential setbacks. This paper zeroes in on […] The post The Digital Transformation Blueprint: A Mosaic of…
The Evolving Landscape of Ransomware Attacks
2023 – What is new in the world of Ransomware By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Ransomware has been making headlines since 2021, and it continues to do […] The post The Evolving Landscape of Ransomware Attacks appeared…