Category: Cyber Defense Magazine

Cyber-Informed Engineering – A New Perspective on OT Security

Cyber-Informed Engineering (CIE) is a new perspective on OT cyber risk – one that is being embraced by OT/engineering teams and IT/enterprise cybersecurity teams alike. This kind of consensus among IT… The post Cyber-Informed Engineering – A New Perspective on OT…

Innovator Spotlight: DataBee™

The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…

Innovator Spotlight: DataBee™

The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed, and unstructured, making it difficult… The post Innovator Spotlight: DataBee™ appeared first on Cyber Defense…

Innovator Spotlight: Normalyze

In today’s fast-paced digital world, data breaches have become the norm, not the exception. With data sprawled across cloud, on-prem, and hybrid environments, organizations face critical challenges in maintaining visibility… The post Innovator Spotlight: Normalyze appeared first on Cyber Defense…

Innovator Spotlight: Harmonic Security

The rapid rise of generative AI (GenAI) has brought about both unprecedented opportunities and significant challenges for organizations, particularly in data protection. According to MIT research, 77% of organizations identify… The post Innovator Spotlight: Harmonic Security appeared first on Cyber…

Innovator Spotlight: AppSOC

The rapid adoption of AI and Generative AI applications has unlocked tremendous potential, but it has also introduced significant security risks that enterprises must address. Gartner predicts that by 2025,… The post Innovator Spotlight: AppSOC appeared first on Cyber Defense…

From Crisis to Catalyst: A CEO’s Lessons Learned from A Cybersecurity Incident

There are events in business and life that put everything else into perspective. Sometimes, these are moments of crisis, yet also moments of clarity; moments of shock, and moments of… The post From Crisis to Catalyst: A CEO’s Lessons Learned…

Rethinking Cyber-Physical Systems Security in the Age of Industry 4.0

As manufacturing advances into the Industry 4.0 era, the integration of Information Technology (IT) and Operational Technology (OT) necessitates a comprehensive defense strategy tailored to the unique needs of industrial… The post Rethinking Cyber-Physical Systems Security in the Age of…

Publishers Spotlight: ForAllSecure

I was thrilled to catch up with ForAllSecure during Black Hat USA 2024.  ForAllSecure is an organization of hackers, developers, and security professionals dedicated to research and innovation in the… The post Publishers Spotlight: ForAllSecure appeared first on Cyber Defense…

Your Company Culture Can Become A Powerful Cybersecurity Resource

If your organization doesn’t already make security a pillar of its culture, this could be the year to start. That’s because the cybersecurity landscape is changing, due to factors including… The post Your Company Culture Can Become A Powerful Cybersecurity…

All-in-One: How Cynet is Revolutionizing Cybersecurity for MSPs

Managed Services Providers (MSPs) are increasingly looking to provide cybersecurity services due to the demand from their current clients. Though the revenue potential is lucrative, the road for many MSPs… The post All-in-One: How Cynet is Revolutionizing Cybersecurity for MSPs…

Internal And External Threat Intelligence

How To Balance the Two Sources In cybersecurity, threat intelligence covers a broad range of activities concerning collection, analysis, and dissemination of information on the current threat landscape. In terms… The post Internal And External Threat Intelligence appeared first on…

Getting Wins for Security Leaders: Strategies and Considerations for Success

Navigating the Cybersecurity Landscape: Achieving Impactful Wins Through Data, Collaboration, and Continuous Improvement Do not think of advocating for critical security investments as a single battle, but a drawn-out campaign… The post Getting Wins for Security Leaders: Strategies and Considerations…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered a massive data breach that exposed 2.7 billion records. The… The post Massive Data Breach at National Public Data Exposes…

Addressing Cybersecurity Challenges in Healthcare: A Strategic Approach

As the healthcare sector becomes increasingly digital, it faces a growing threat from cybersecurity attacks. Recent years have seen a disturbing rise in data breaches, ransomware attacks, and other cyber… The post Addressing Cybersecurity Challenges in Healthcare: A Strategic Approach…

Publisher’s Spotlight: Syxsense

I was thrilled to catch up with Syxsense during Black Hat USA 2024. Syxsense is a cybersecurity company that provides unified endpoint management and security solutions. The company specializes in… The post Publisher’s Spotlight: Syxsense appeared first on Cyber Defense…

Choosing Security: Why Companies Should Reject Ransom Payments

With ransomware attacks reaching unprecedented levels, businesses face tough decisions when their data is held hostage. While the temptation to pay the ransom to recover data quickly is strong, this… The post Choosing Security: Why Companies Should Reject Ransom Payments…

Publishers Spotlight: Endace

Fundamental and Foundational to InfoSec and Regulatory Compliance is Capturing all Packets. Figure 1.  Endace High-Performance Packet-capture Appliance Endace specializes in always-on, hybrid-cloud packet capture, addressing the challenge of ensuring… The post Publishers Spotlight: Endace appeared first on Cyber Defense…

Defense in Diversity: A Strategy for Robust Cybersecurity

The concept of “defense in depth” dates back to ancient times, epitomized by the ramparts, draw-bridge, towers, and battlements surrounding a medieval castle.  Cybersecurity’s adaptation of the idea — multiple… The post Defense in Diversity: A Strategy for Robust Cybersecurity…

Lead with simplicity: A guide for strengthening security in logistics

Supply chains are the pulse of our global economy. When they falter, the effects can ripple through industries — impacting production lines, delivery schedules, company performance, and, ultimately, customer satisfaction…. The post Lead with simplicity: A guide for strengthening security…

Publishers Spotlight: DigitalXForce

When I go to BlackHat I’m always looking for cyber innovation across many vectors including cyber resilience artificial intelligence and most importantly compliance. This year I met up with Lalit… The post Publishers Spotlight: DigitalXForce appeared first on Cyber Defense…

Shedding Light on The Dark Web: Enhancing Cybersecurity Through Proactive Monitoring

In the digital age, the dark web has emerged as a clandestine marketplace for illicit activities, including the sale of stolen data, illegal software and various forms of malware. The proliferation of these marketplaces poses significant threats to personal, corporate and national security. As… The post Shedding Light on The Dark Web: Enhancing Cybersecurity…

Maximizing Cybersecurity Impact Within Budget Constraints

Cybersecurity is the cornerstone of organizational stability and resilience today. Despite its critical importance, budgetary allocations often fall short due to competing priorities. Mimecast recently surveyed 1,100 CISOs and information… The post Maximizing Cybersecurity Impact Within Budget Constraints appeared first…

The Undeniable but Often Overlooked Human Element of Cybersecurity

It is firmly established that there is no such thing as 100% security – in fact, a security breach is not a matter of ‘if’ but ‘when.’ In other words, risk will always exist, and businesses… The post The Undeniable but Often Overlooked Human Element of…

Transparency in Cybersecurity: The Importance of Accurate Vulnerability Disclosures

Recently, the cybersecurity world has been rattled by a series of critical vulnerabilities discovered in Ivanti Connect Secure VPN software. In the wake of these ongoing vulnerability issues, Ivanti has… The post Transparency in Cybersecurity: The Importance of Accurate Vulnerability…

Balancing the Scales: Addressing Privacy, Security, and Biases in AI based on the White House Blueprint for an AI Bill of Rights

Within the last few weeks, the major AI competitors OpenAI, Google, and Microsoft unveiled several new products and capabilities of their platforms. Perhaps, most notable was OpenAI’s ability to now… The post Balancing the Scales: Addressing Privacy, Security, and Biases…

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter

I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My RSA 2024 started on Sunday, speaking with a group of… The post The Art of Possible: Redefining Cybersecurity in the…

Safeguarding The Backbone: The Critical Imperative to Protect Operational Technology (OT) Devices

Introduction Operational Technology (OT) devices, integral in controlling and monitoring industrial processes, have become prime targets for cyberattacks. Since late 2023, there has been a notable increase in attacks on… The post Safeguarding The Backbone: The Critical Imperative to Protect…

Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders

The Federal OT footprint – from military base operations to their public utilities, from postal operations to NASA missions – is immense, which means the potential cyber attack surface is… The post Who’s Minding the Store? Why Operational Technology Security…

The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth

Data security and consumer trust go hand-in-hand in our evolving digital world There’s no doubt that data is a catalyst of growth, forcing companies to increasingly rely on it to… The post The Value of Trust: How Companies Can Harness…

It Is Time for Smart Cyber Requirements for the Water Sector

Since 2021, the Biden Administration has been consistently talking about the limitations of a purely voluntary approach to cybersecurity for critical infrastructure, and the need for a strategic shift. Among… The post It Is Time for Smart Cyber Requirements for…

Looking Past DevOps: AI, ClickOps and Platform Engineering

About fifteen years ago, DevOps radically overhauled the world of software engineering. Previously, the development process had been defined by sometimes maddening delays, as development teams waited for operations teams… The post Looking Past DevOps: AI, ClickOps and Platform Engineering…

The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare

In an alarming revelation, Kaiser Foundation Health Plan reported a data breach impacting over 13 million individuals. For years, there has been an unspoken but critical vulnerability in the healthcare… The post The Kaiser Data Breach Should Be a Wake-Up…

How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert

It doesn’t take much to guess why cybercriminals increasingly target banking applications including emerging fintech and trading as their prime targets – cybercriminals have and continue to be largely financially-motivated…. The post How to Best Secure Banking Applications – Top…

Mitigating Data Breaches with AI-Driven Security Solutions

SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes, even those equipped with robust security measures. As cybercriminals become… The post Mitigating Data Breaches with AI-Driven Security Solutions appeared…

The Dual Nature of Ransomware Attacks

Financial Gain and Geopolitical Strategy Ransomware attacks have evolved from mere cybercriminal activities to sophisticated operations serving dual purposes: financial gain for attackers and advancing the geopolitical objectives of adversarial… The post The Dual Nature of Ransomware Attacks appeared first…

Unlocking the Power of Behavioral Cloud Native Threat Detection and Response

Behavioral detection and response is not a new concept, and the top three detection and response players command a combined market capitalization of $100 billion. But the rise of cloud… The post Unlocking the Power of Behavioral Cloud Native Threat…

Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management

The massive Snowflake breach disclosed recently, involving hundreds of millions of stolen customer records, is a stark wake-up call for organizations to proactively manage their SaaS security. No doubt the… The post Changing the Passive to Active: Updating SaaS Cybersecurity…

Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management

Single Sign-On (SSO) serves as the linchpin connecting corporate networks, facilitating seamless access to various web applications without the need for repeated login credentials. However, there are several untold challenges… The post Deep Dive: Unveiling the Untold Challenges of Single…

How the Newest Tech Changes Cybersecurity Needs in the Legal Industry

Responsibly Adopting Technology to Improve Law Firm Productivity Lawyers face incredible pressure in their jobs to perform accurately and quickly. Thankfully, technology has been introduced that now allows legal professionals… The post How the Newest Tech Changes Cybersecurity Needs in…

Pioneering the New Frontier in AI Consumer Protection and Cyber Defense

In a groundbreaking move, the first state in the U.S. has passed comprehensive legislation aimed at protecting consumers from the potential risks associated with AI. The new Utah Artificial Intelligence… The post Pioneering the New Frontier in AI Consumer Protection…

Digital Identities Have Evolved — Cyber Strategies Should Too

The scale of identity exposure has increased significantly, with over 90% of surveyed organizations reporting an identity-related breach within the last year. These attacks have long-lasting consequences – SpyCloud’s 2024 Identity Exposure Report found… The post Digital Identities Have Evolved — Cyber Strategies Should…

Stop Chasing the AI Squirrel and Patch… Just Patch

In the contemporary technological landscape, the allure of advanced artificial intelligence (AI) systems often captivates the collective imagination of the tech industry and beyond. Stories of deepfakes, such as the… The post Stop Chasing the AI Squirrel and Patch… Just…

Guardians of the Grid: Cyber-Secure Microgrids and the Future of Energy Resilience

The Crucial Role of Cyber-Resilient Microgrids The vulnerability of major metropolitan power grids to natural disasters has become a pressing concern, but mother nature isn’t the only thing threatening our… The post Guardians of the Grid: Cyber-Secure Microgrids and the…

Latest WatchGuard Report Reveals Rise in Threat Actors Exploiting Remote Access

Cybersecurity threats continue to grow, with the threat landscape constantly evolving and hackers employing increasingly sophisticated and unpredictable methods. With an ongoing cybersecurity skills shortage, the need for Managed Service… The post Latest WatchGuard Report Reveals Rise in Threat Actors…

The Pitfalls (and How to Avoid Them) for Cybersecurity Startup Founders

The cybersecurity landscape is a battlefield, but the biggest threats don’t always come from external hackers. As a seasoned warrior in this space, I’ve seen countless founders, brimming with passion… The post The Pitfalls (and How to Avoid Them) for…

Security Threats Targeting Large Language Models

Evolving landscape of LLM Security The emergence of Large Language Models (LLMs) has revolutionized the capabilities of artificial intelligence, offering unprecedented potential for various applications. However, like every new technology,… The post Security Threats Targeting Large Language Models appeared first…

Healthcare Industry Under Siege: Latest String of Ransomware Attacks Renews Emphasis on Cybersecurity Defenses

As the ransomware threat landscape continues to wreak havoc on industries across the nation, healthcare providers all over the country are having difficulties receiving payment due to an attack that… The post Healthcare Industry Under Siege: Latest String of Ransomware…

The Role of Human Error in Data Spillage Incidents

Unraveling Human Factors in Data Breaches Data spillage is a term used to describe the exposure of sensitive or classified information outside an organization’s designated boundary of network or safety… The post The Role of Human Error in Data Spillage…

The Morphing of Misinformation in a Super Election Year

Security a Top Concern During 2024 Election ‘Super-Cyle’ With an unprecedented ‘super-cycle’ of elections in 2024, almost half the world’s population will go to the polls before the year is… The post The Morphing of Misinformation in a Super Election…

Overcome AI-Oriented Phishing Attacks with These Sure-Fire Strategies

Artificial intelligence is an ever-evolving subject; year by year, its landscape is expanding to different industries, and the outcome of its optimization is noteworthy. One of the prominent tech giants,… The post Overcome AI-Oriented Phishing Attacks with These Sure-Fire Strategies…

New Phishing Campaign Using AI generated Emails, Human Live Chat to Target Social Media Business Accounts

Fraudsters leverage complex phishing scams in attempt to gain control over organizations’ Meta accounts A sophisticated phishing campaign is targeting businesses of every size in an attempt to compromise Facebook… The post New Phishing Campaign Using AI generated Emails, Human…

Why the MoD Breach Calls for a Cybersecurity Overhaul

The recent cyber attack on the Ministry of Defence, which compromised the personal information of UK military personnel, serves as a stark warning for organisations across the globe and reinforces… The post Why the MoD Breach Calls for a Cybersecurity…

How to Prepare for ISO 27001:2022’s Threat Intelligence Requirements

Countdown to October 2025 As the cybersecurity landscape continues to evolve and become more complex, international regulations are similarly following suit to keep pace and set a benchmark to mitigate… The post How to Prepare for ISO 27001:2022’s Threat Intelligence…

Optimizing IT Team Collaboration – An Innovative Approach to Enhancing Productivity

Optimizing IT team collaboration hinges on recognizing their unique team challenges, such as siloed knowledge and communication barriers, as well as the different working styles of product managers, software engineers,… The post Optimizing IT Team Collaboration – An Innovative Approach…

AI and Cybersecurity: Mitigating Risks and Safeguarding Digital Assets

Leveraging Artificial Intelligence to Enhance Cybersecurity Defenses Artificial Intelligence has become essential for safeguarding digital resources in cybersecurity. As organizations strive to defend against pragmatic threats, AI offers crucial risk… The post AI and Cybersecurity: Mitigating Risks and Safeguarding Digital…

RSA Conference 2024: Exploring our Current Cybersecurity Realities Amidst AI Myths

AI. Artificial Intelligence. One acronym, two words that seem to have reshaped the landscape of cybersecurity. At the 2024 RSA Conference, it was ubiquitous: stamped on almost every booth’s showcase,… The post RSA Conference 2024: Exploring our Current Cybersecurity Realities…

RSA Conference 2024 Highlights: Cutting-Edge Cybersecurity Innovations

AI in Action: Real-World Breakthroughs and Innovations Attending the RSA Conference for the first time was an incredible experience! Ever since I began my journey in cybersecurity, attending the RSA… The post RSA Conference 2024 Highlights: Cutting-Edge Cybersecurity Innovations appeared…

Strengthening Cybersecurity – Transforming in the Age of Healthcare Digitalization

Healthcare and technology increasingly intersect in today’s world, and cybersecurity has become a primary concern for many companies. However, the recent attack on Change Healthcare serves as a harsh reminder… The post Strengthening Cybersecurity – Transforming in the Age of…

Comparing MDR vs SIEM: Which Is Better for Your Business?

By Vira Shynkaruk, Cybersecurity Content Expert, UnderDefense Making the right call on cybersecurity solutions is paramount for businesses, especially now, when they are constantly under siege from cyberattacks. The critical […] The post Comparing MDR vs SIEM: Which Is Better…

Rogue Nations: An Assessment of State-Sponsored Cyberattacks.

By Jacques de la Riviere, CEO, Gatewatcher Few prefixes excite the cybersecurity market as much as ‘state-sponsored.’ The label immediately conjures images of well-equipped, highly-resourced teams targeting high-profile organisations and […] The post Rogue Nations: An Assessment of State-Sponsored Cyberattacks.…

Get 10x more Visibility across APTs with Red Piranha’s SOC-as-a-Service and Crystal Eye

By Adam Bennett, CEO, Red Piranha Cyberattacks are on the rise and it’s crucial for organizations to have a reliable security system that can detect and respond to threats in […] The post Get 10x more Visibility across APTs with…

A National Imperative – Cyber Resiliency

Strategies to Safeguard Critical Infrastructure Against Cyber Threats By Andrea E. Davis, Founder and President of The Resiliency Initiative I started my career in emergency management in 1999. At the […] The post A National Imperative – Cyber Resiliency appeared…

Special Cybersecurity Considerations for Medical and Legal Practices

“Protect The Most Vulnerable at Their Most Vulnerable Times” By Jim Ford, Founder and CEO, PatientLock® and JurisLock™ In the spring of 2018, my (then) pregnant wife and I went […] The post Special Cybersecurity Considerations for Medical and Legal…

How to Hunt for Volt Typhoon Malware in Critical Infrastructure

🚨🔍 Don’t miss out on the Hunt for Volt Typhoon event! 🌐💻 Join us to explore cutting-edge cyber tactics, innovative defense strategies, and the latest in threat detection. Perfect for […] The post How to Hunt for Volt Typhoon Malware…

Cybersecurity as a Service Market: A Domain of Innumerable Opportunities

Cybersecurity as a Service Market By Aashi Mishra, Content Writer, Research Nester The increased internet usage, all across the globe, is giving rise to cybercrime cases. Cybercrime is any unlawful […] The post Cybersecurity as a Service Market: A Domain…

How Improving EV Charging Infrastructure Can Bolster US Cybersecurity Measures

By Elaina Farnsworth, Co-founder & CEO — SkillFusion The surging popularity of electric vehicles (EVs) is marking a strong push toward overall sustainability for the United States. However, as EV […] The post How Improving EV Charging Infrastructure Can Bolster…

Navigating the Perilous Waters of Supply Chain Cybersecurity

By Kenneth Moras Introduction: In today’s interconnected business environment, reliance on innovative vendors and open source solutions is inevitable. However, these supply chains also stand on the frontline in the […] The post Navigating the Perilous Waters of Supply Chain…

The Challenge of Combatting Threats Against Autonomous Vehicles

By Joseph Hladik, Cyber Group Lead, Neya Systems From perception and sensing to mapping and localization, both off-road and on-road autonomous vehicles rely heavily on software and connectivity to operate […] The post The Challenge of Combatting Threats Against Autonomous…

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally […] The post Combating Cyber-attacks with Threat-Intelligence appeared first on…