By Michael Mumcuoglu, CEO & Co-Founder, CardinalOps As we approach the second half of a year punctuated by ransomware and supply chain attacks, a top concern on nearly everyone’s mind […] The post Why It’s More Important Than Ever to…
Category: Cyber Defense Magazine
Cybersecurity Is Changing: Is the Experience Positive or Negative?
By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies Cybersecurity is Changing: Is the Experience Positive or Negative? Unfortunately, cybersecurity and cybercrime represent the age-old Hollywood trope famously […] The post Cybersecurity Is Changing: Is the Experience Positive…
Navigating The Cybersecurity Horizon: Insights and Takeaways from Blackhat2023
Exploring the Future of Cybersecurity at BlackHat 2023 By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine In our ever-evolving world, where digital threats loom larger and more diverse than […] The post Navigating The Cybersecurity Horizon: Insights and Takeaways…
Understanding The Impact of The SEC’s Cybersecurity Disclosure Regulations
By George Gerchow, CSO and SVP of IT, Sumo Logic Corporate security and compliance teams are scrambling to understand the implications of the U.S. Security and Exchange Commission’s (SEC) recently […] The post Understanding The Impact of The SEC’s Cybersecurity…
The Emergence of AI In the Enterprise: Know the Security Risks
By John Anthony Smith, CEO Conversant Group, and Eli Nussbaum, Managing Director, Conversant Group As businesses strive to keep up with the rapid pace of technological advancement, many are turning […] The post The Emergence of AI In the Enterprise:…
The Human Firewall: Strengthening the Weakest Link in Cybersecurity
By Steve Soukup, CEO, DefenseStorm Innovative technology has revolutionized the way we work and live by unlocking a wealth of new capabilities. As artificial intelligence makes daily operations more efficient […] The post The Human Firewall: Strengthening the Weakest Link…
The Rising Tide of Cybercrime as A Service (CaaS)
By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which, quite alarmingly, is like an online marketplace for cybercriminals and […] The post The Rising Tide of Cybercrime as A…
Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security
By Alan Bavosa, VP of Security Products, Appdome In recent years, mobile apps have surged in popularity providing consumers with instant access to a variety of life essentials such as […] The post Ushering in the Next Phase of Mobile…
The $390 Million Alarm Bell: Why Cold Wallets Are No Longer Optional in Crypto
By Mark Venables, CEO of The Crypto Merchant In July 2023, the cryptocurrency sector saw a significant escalation of cyber-related incidents. The loss was initially reported at $486 million but […] The post The $390 Million Alarm Bell: Why Cold…
The 5 Things Every Leader Should Know for A Cyber-Vigilant Summer
By Michael Nizich, PhD, CISSP As another summer comes and goes and we start to prepare for another school year, IT departments all over the country are dealing with fallout […] The post The 5 Things Every Leader Should Know…
The Embedded Systems and The Internet of Things
By Milica D. Djekic The Internet of Things (IoT) is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This […] The post The Embedded Systems and The Internet of…
Safeguard Business Transactions with Online Payment Security Tips
By Zac Amos, Features Editor, ReHack Secure online payments have become an integral part of the shopping experience. More people are using e-commerce than ever before, and business owners must […] The post Safeguard Business Transactions with Online Payment Security…
Increase In Mobile Threats Calls for A Proactive Mindset.
By Nicole Allen, Senior Marketing Executive at Salt Communications Mobile threats are always evolving in the world of business. Threats to mobile security are increasing: More than 60% of cyber […] The post Increase In Mobile Threats Calls for A…
Halting Hackers on the Holidays 2023
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive […] The post Halting Hackers on the Holidays 2023 appeared…
Navigating the Uncertainties of CMMC 2.0: An Urgent Call for Clarity
Unpacking the Complexities, Implications, and Future Outlook of the Cybersecurity Maturity Model Certification By David Brewer, Director of IT/Cybersecurity (Acting), Saalex Solutions, a division of Saalex Corporation In the hyperconnected […] The post Navigating the Uncertainties of CMMC 2.0: An…
IT Modernization Efforts Need to Prioritize Cybersecurity
By Mark Marron, CEO and President, ePlus, Inc. Organizations are increasingly advancing their digital transformation efforts to deliver internal efficiencies, reduce costs, and improve customer experiences. As a side-effect of […] The post IT Modernization Efforts Need to Prioritize Cybersecurity…
From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies
By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security concept in the early 2000s, it was largely focused on […] The post From Network Perimeters to Cloud Access Security…
How to Avoid Common Security Incidents in the Public Cloud
By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the global spending on public cloud services was around $490.3 billion […] The post How to Avoid Common Security Incidents in…
E-mail Compromise
How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of the most beloved cybercriminals’ method for compromise of organization’s data. […] The post E-mail Compromise appeared first on Cyber Defense…
IP network security in the age of DDoS and quantum computing
By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to address the global broadband divide, continued digital transformation with the […] The post IP network security in the age of…