2023 – What is new in the world of Ransomware By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Ransomware has been making headlines since 2021, and it continues to do […] The post The Evolving Landscape of Ransomware Attacks appeared…
Category: Cyber Defense Magazine
Proven Strategies to Fix This Cybersecurity Shortage
Cyber Leader and Former Marine breaks down how we can recruit and train new cyber talent for this growing tech labor shortage By Chris Starling, Assistant Vice President, NPower Skillbridge […] The post Proven Strategies to Fix This Cybersecurity Shortage…
Securing The Virtual Runway to The Cloud
By Jason Mafera, Field CTO, North America, IGEL The ‘endpoint’ has transformed from traditional desktop hardware to any number of devices, digital workspaces, and locations, offering new opportunities for cybercriminals […] The post Securing The Virtual Runway to The Cloud…
Sophisticated Cyber Threats Require a New Approach to Digital Security in Healthcare.
By Saeed Valian, Chief Information Security Officer, symplr In the era of modernization, healthcare organizations are pushing for digitalization in their EMR’s. While there are significant benefits here, it does […] The post Sophisticated Cyber Threats Require a New Approach…
The Case Study: The Exploitation of Business Assets
By Milica D. Djekic The role of this case study is to explain how it’s feasible to exploit some business assets using the IoT search engines and some hacking tools. […] The post The Case Study: The Exploitation of Business…
Combatting Social Engineering – The Invisible Threat
By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology […] The post Combatting Social Engineering – The Invisible Threat…
Cyber Strategy Is Not a Synonym for Tech Stack
By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid. Losing can mean going out of business. The cars, marvels […] The post Cyber Strategy Is Not a Synonym for…
Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket
Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices have become indispensable companions in our daily lives, offering us […] The post Mobile Insecurity: Unmasking the Vulnerabilities in Your…
Beyond Mere Compliance
Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and sprinkler systems merely because their installation is required by local […] The post Beyond Mere Compliance appeared first on Cyber…
Stronger Together: Attack Surface Management and Security Validation
By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as cyberattacks increase in both frequency and severity. The average is […] The post Stronger Together: Attack Surface Management and Security…
How to Unify Multiple Analytics Systems to Determine Security Posture and Overall Risk
By Amol Bhagwat, VP, Solutions and Field Engineering at Gurucul As the threat landscape continues to get more complex, security analytics are becoming essential for identifying, preventing and responding to […] The post How to Unify Multiple Analytics Systems to…
How to Overcome the Most Common Challenges with Threat Intelligence
By David Monnier, Chief Evangelist, Team Cymru Fellow What would be your ideal approach to protecting your organization? Knowing exactly what threats are targeting your organization, well before those adversaries […] The post How to Overcome the Most Common Challenges…
The Persistent Danger of Remcos RAT
By Dilpreet Singh Bajwa, Senior Consultant, Cyfirma Executive Summary At Cyfirma, we are dedicated to providing you with up-to-date information on the most prevalent threats and tactics used by malicious […] The post The Persistent Danger of Remcos RAT appeared…
Forging A New Era of Invoicing Security
How blockchain-powered software is preventing cyber attacks By Ramon AB, CEO and Co-Founder of Nova Technology Invoicing may not be the first thing that pops up in a conversation around […] The post Forging A New Era of Invoicing Security…
Digital Criminal Ontology; Trading Pistols for Programmers
By James Allman Talbot, Head of Incident Response & Threat Intelligence, Quorum Cyber Since computers were first connected with Ethernet cables, Hollywood started romanticizing hackers. In 1983, WarGames was released. […] The post Digital Criminal Ontology; Trading Pistols for Programmers…
Companies Must Strengthen Cyber Defense in Face of Shifting Threat Actor Strategies
Critical for organizations to understand attackers’ tactics, techniques, and procedures. By Bobby Cornwell, Vice President, Strategic Partnership Enablement & Integration, SonicWall The 2023 mid-year cyber threat report card portends an […] The post Companies Must Strengthen Cyber Defense in Face…
How Are Security Professionals Managing the Good, The Bad and The Ugly of ChatGPT?
By Brett Raybould, EMEA Solutions Architect, Menlo Security Today, headlines surrounding AI tools such as ChatGPT today are largely pessimistic. From the doom-mongering narrative that technologies will put millions out […] The post How Are Security Professionals Managing the Good,…
Anticipation And Agility: Cyber Protection for the 2024 Olympics
By Jacques de La Rivière, CEO, Gatewatcher From July 26 to September 8 next year, Paris will host the 2024 Olympic and Paralympic Games. With less than a year before […] The post Anticipation And Agility: Cyber Protection for the…
Lost in Translation: Mitigating Cybersecurity Risks in Multilingual Environments
By Ofer Tirosh In today’s interconnected, globalized world, the need for communication across multiple languages is more important than ever. But with increased connectivity and linguistic diversity comes a new […] The post Lost in Translation: Mitigating Cybersecurity Risks in…
Halting Hackers on the Holidays 2023 Part II: The Apps You (Shouldn’t) Trust
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine Read Part I first: Halting Hackers on the Holidays 2023 – Cyber Defense Magazine As we count the breaches and total […] The post Halting Hackers on the Holidays 2023 Part…