LastPass Evolves Secure Access Experiences to Combat Shadow IT and AI Risks for CISOs Picture your organization humming along, with teams adopting new apps to boost efficiency. But beneath that… The post Innovator Spotlight: LastPass appeared first on Cyber Defense…
Category: Cyber Defense Magazine
Bridging the Cybersecurity Talent Gap
There’s no doubt about it. Cybersecurity incidents are rising. In 2024, the FBI reported a 9% increase in ransomware complaints targeting critical U.S. infrastructure sectors, such as healthcare, manufacturing and government facilities…. The post Bridging the Cybersecurity Talent Gap appeared first on…
Digital Transformation Failures: A National Security Crisis in the Making
In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business and defense organizations alike, the ability to leverage the power of digital technologies… The post Digital Transformation Failures: A National Security Crisis in…
Securing Linux Systems in the Age of AI: Unified Security Strategies for Modern Enterprises
Introduction In the rapidly evolving landscape of cybersecurity, the integration of Artificial Intelligence (AI) has emerged as a transformative advancement. This is particularly true in the realm of Linux-based systems,… The post Securing Linux Systems in the Age of AI:…
Preparing for the EU’s DORA amidst Technical Controls Ambiguity
The financial sector is bracing for a significant shift in its digital landscape as the EU’s Digital Operational Resilience Act (DORA) prepares to take effect in January 2025. This new… The post Preparing for the EU’s DORA amidst Technical Controls…
Beyond Buzzwords: The Real Impact of AI on Identity Security
Artificial intelligence (AI) has become one of the most discussed technologies in recent years, often touted as the answer to many of today’s pressing challenges. In the cybersecurity space, especially… The post Beyond Buzzwords: The Real Impact of AI on…
Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets
Digital media created more opportunities for companies to engage with consumers than ever before, but such increased interconnectedness has a price. Attacks are becoming progressively advanced, targeting not only a… The post Beyond the Firewall: Protecting Your Marketing Department from…
A CISO’s Guide to Managing Cyber Risk in Healthcare
Now more than ever before, our healthcare data is under attack. Of all of the sensitive information available on the dark web, medical records are among the most expensive, costing on… The post A CISO’s Guide to Managing Cyber Risk in…
Why The Open Web Application Security Project (OWASP) Mobile Application Security (MAS) Project Is Critical
The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools which have recently been added to OWASP MAS, which provides… The post Why The Open Web Application Security Project (OWASP)…
The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats
Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and… The post The Critical Role of Sboms (Software Bill of…
Ransomware Tactics Are Shifting. Here’s How to Keep Up
It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums… The post Ransomware Tactics Are Shifting. Here’s How to Keep…
12 Ways to Protect Your Business from Hackers During Remote Work
Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%) expected to be working remotely by 2025. In fact, 42% of office employees have stated they would… The post 12 Ways to Protect Your Business from Hackers…
Boost Operational Resilience: Proactive Security with CORA Best Practices
On almost a monthly basis, the US Cybersecurity & Infrastructure Security Agency (CISA) publishes advisories about the latest cybersecurity risks, attacks and vulnerabilities to help organizations defend and protect themselves… The post Boost Operational Resilience: Proactive Security with CORA Best…
More Than Sales… How Brokers Can Play a Critical Role in Strengthening the USA’s National Cybersecurity
As cyber threats continue to rise, enterprises can rely on unexpected allies for support: their insurance brokers. Brokers are not only able to secure robust cyber insurance coverage, they are… The post More Than Sales… How Brokers Can Play a…
Using Artificial Intelligence for Strengthening Email Security
Today, email-based attacks are increasingly sophisticated, however artificial intelligence (AI) can offer vital defense. With AI use, organizations can counteract advanced phishing, ransomware, and business email compromise (BEC) schemes that… The post Using Artificial Intelligence for Strengthening Email Security appeared…
Innovator Spotlight: Oleria
Identity’s New Frontier: How CISOs Can Navigate the Complex Landscape of Modern Access Management The cybersecurity battlefield has shifted. No longer are perimeter defenses and traditional identity management sufficient to… The post Innovator Spotlight: Oleria appeared first on Cyber Defense…
Innovator Spotlight: Straiker
The AI Security Frontier: Protecting Tomorrow’s Digital Landscape Cybersecurity leaders are facing an unprecedented challenge. As artificial intelligence transforms how organizations operate, a new breed of security solutions is emerging… The post Innovator Spotlight: Straiker appeared first on Cyber Defense…
Innovator Spotlight: Xcape
Continuous Vulnerability Management: The New Cybersecurity Imperative Security leaders are drowning in data but starving for actionable insights. Traditional penetration testing has become a snapshot of vulnerability that expires faster… The post Innovator Spotlight: Xcape appeared first on Cyber Defense…
Innovator Spotlight: Corelight
The Network’s Hidden Battlefield: Rethinking Cybersecurity Defense Modern cyber threats are no longer knocking at the perimeter – they’re already inside. The traditional security paradigm has fundamentally shifted, and CISOs… The post Innovator Spotlight: Corelight appeared first on Cyber Defense…
Exploring Key Technology Trends for 2024
Fast forward to today, and the importance of staying current with the latest tech trends can’t be overstated – it’s the difference between thriving and struggling to keep up. Professionals… The post Exploring Key Technology Trends for 2024 appeared first…