By Eric Sugar, President, ProServeIT In an era defined by the relentless advance of digitalization and the ever-expanding interconnectivity of industrial systems, the realm of cybersecurity has been thrust into […] The post Implementing ZTA: Benefits and Best Practices appeared…
Category: Cyber Defense Magazine
Attackers Keep Evolving: Lessons from Expel’s Q2 2023 Quarterly Threat Report
Cyberdefenders plug the holes, so attackers innovate to try to stay ahead. By Aaron Walton, Threat Intel Analyst, Expel Most cyberattackers don’t try to reinvent the wheel: as long as […] The post Attackers Keep Evolving: Lessons from Expel’s Q2…
What are the Essential Skills for Cyber Security Professionals in 2024?
Where should you invest time and resources to drive success when it comes to the must-have skills and tools for senior leaders in the industry. By Sarah Gilchriest, Chief People […] The post What are the Essential Skills for Cyber…
Enhancing The Nation’s Cybersecurity Workforce
Supporting Critical Infrastructure Resilience with Skill-Based Labor By Randall Sandone, Executive Director, Critical Infrastructure Resilience Institute at The Grainger College of Engineering at the University of Illinois Urbana-Champaign “With almost […] The post Enhancing The Nation’s Cybersecurity Workforce appeared first…
Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy
WHY DIGITAL TRUST MATTERS By Lalit Ahluwahli, CEO & Founder, DigitalXForce & iTrustXForce We all know that cybersecurity and privacy are becoming more and more critical with digital transformation. The […] The post Why Digital Trust Has Become More Critical…
Does Zero Trust Improve Productivity?
By Zac Amos, Features Editor, ReHack Zero trust has gained significant attention as an effective approach to secure digital assets. It’s a security framework that’s also believed to impact employee […] The post Does Zero Trust Improve Productivity? appeared first…
Cybersecurity Threats in Global Satellite Internet
By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the […] The post Cybersecurity Threats in Global Satellite Internet appeared…
Classic Information Security Management Errors
How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as an information security expert, I encounter numerous errors, many of […] The post Classic Information Security Management Errors appeared first…
Prioritizing Action After the Threat Headlines
By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially cybersecurity professionals, know the feeling. Minutes – sometimes seconds – […] The post Prioritizing Action After the Threat Headlines appeared…
How to Identify and Respond to End-of-Life and Out-of-Service Operating Systems?
By Chahak Mittal, GRC Manager, Universal Logistics In the ever-changing world of technology, managing end-of-life (EOL) and out-of-service (OOS) operating systems has become a critical concern for organizations of all […] The post How to Identify and Respond to End-of-Life…
Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced Security
Mobilizing Collective Action for Telecom Signaling Security By Rowland Corr, Vice President and Head of Government Relations, Enea Telecommunications, particularly mobile networks, have become the backbone of our modern, interconnected […] The post Unmasking the Vulnerabilities in Telecom Signaling: A…
Deepfakes and AI’s New Threat to Security
The high cost of free open-source generative software. By Luke Arrigoni, Founder, Loti The rise of deepfake technology poses significant risks to celebrities, high-net-worth individuals, and the general public, with […] The post Deepfakes and AI’s New Threat to Security…
A Tale of Overcoming Cyber Threats with Auto Pentesting and CTEM
By Lydia Zhang, President & Co-Founder, Ridge Security Technology Chief Information Security Officer (CISO) Emily Reed is responsible for safeguarding the digital assets of a thriving healthcare organization renowned for […] The post A Tale of Overcoming Cyber Threats with…
Industry Benchmark Report, Issued by The FAIR Institute, Unveils the Dollar Impact of Cyber Incidents
The 2024 Cybersecurity Risk Report Provides CISOs Insights into the Likelihood and Financial Impact of Top Cyber Risks. By Luke Bader, Director, Membership and Programs, FAIR Institute The FAIR Institute, […] The post Industry Benchmark Report, Issued by The FAIR…
Beyond Resumes: Uncovering Hidden Talent at the New Jersey Judiciary
Illuminating the individual beyond the black and white By Darrin Straff, Senior Staffing Consultant, NinjaJobs A Deeper Dive In my recent articles, I’ve discussed the importance of looking beyond resumes […] The post Beyond Resumes: Uncovering Hidden Talent at the…
What You Need to Know to Embrace the Imminent Quantum Shift for Your Cryptography Future
By Eddy Zervigon, CEO of Quantum Xchange Cryptography has long been essential in ensuring the protection of data and communication networks. However, even as we rely on it to safeguard […] The post What You Need to Know to Embrace…
How Cloud Solutions Can Lead to Stronger, More Secure IT Operations
By Mike Wiseman, Vice President, Public Sector, Pure Storage In fiscal year 2022, the federal government spent a total of $12.3 billion on cloud goods and services – a 30 […] The post How Cloud Solutions Can Lead to Stronger,…
Addressing Bias in Insider Risk Monitoring
By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […] The post Addressing Bias in Insider Risk Monitoring appeared…
How Autonomous Vehicles are Revolutionizing the Last-Mile Logistics Industry
Cybersecurity will be one of the key concerns as last-mile logistics companies look to enhance efficiency with autonomous vehicles. By Anar Mammadov, CEO, Senpex Technologies Travelers who hail a taxi […] The post How Autonomous Vehicles are Revolutionizing the Last-Mile…
Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’
By Brett Raybould, EMEA Solutions Architect, Menlo Security Phishing remains one of the most prevalent challenges facing organisations, with more than three billion malicious emails estimated to be sent around […] The post Phishing Campaign Exploits Open Redirection Vulnerability In…
The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox
By Ken Cox, President of Hostirian Despite the technological advancements brought by automation and the enhanced capabilities of data analytics that have transformed decision-making processes, the digital age has proved […] The post The Ethics And Privacy Concerns Of Employee…
The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles
By Kevin Beasley, CIO, VAI Increased competition and new regulatory requirements are increasing the tempo of digital transformation among mid-market companies. In fact, Deloitte’s 2023 Mid-Market Technology Trend report found […] The post The Balancing Act for Mid-Market Firms: Navigating…
ImmuniWeb AI Platform
Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […] The post ImmuniWeb AI Platform appeared first on Cyber…
OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft
Securing Operational Technology ACCESS THE RECORDING Kick-start your OT security program, wherever you are in your journey. Gain industry-specific insights into OT cybersecurity challenges and equip yourself with practical strategies […] The post OT Security Q&A for Cybersecurity Leaders with…
Safeguarding the Code That Drives Modern Vehicles
By Soujanya Ain is a Product Marketing Manager at GitGuardian The automotive landscape has evolved dramatically, from mechanical marvels to sophisticated platforms on wheels driven by intricate computer systems. Surprisingly, […] The post Safeguarding the Code That Drives Modern Vehicles…
AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud
By Tim Ward, Chief Strategy Officer, XConnect Robocalls are relentlessly targeting consumers and causing mistrust for the telecom industry as a whole. This is a problem that is accelerating as […] The post AI and the Next Wave of Robocalls:…
Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack
By Carl Cadregari, Executive Vice President, FoxPointe Solutions Regardless of the industry in which they operate, organizations have likely witnessed the wave of destructive MOVEit breaches sweeping the globe during […] The post Building a Secure Data-Protection Infrastructure to Protect…
Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset
By John A. Smith, CSO, Conversant Group If data is the new oil, this holds especially true for law firms as they are wholly dependent on the information they store […] The post Do You Know Where Your Data Is?…
2024 Predictions: The Rise of AI Brings New Security Challenges
By Imperva Executives: Karl Triebes, Lebin Cheng, Peter Klimek, Lynn Marks, and Terry Ray The emergence of generative AI has put new resources in the hands of both attackers and […] The post 2024 Predictions: The Rise of AI Brings…
SIEM vs XDR: Capabilities and Key Differences
We compare the differences in SIEM and XDR’s respective contributions to security By Aimei Wei, Chief Technical Officer and Founder, Stellar Cyber All enterprises comprise vast webs of interconnected devices. […] The post SIEM vs XDR: Capabilities and Key Differences…
What’s The Role of Gaslighting in The Cyber Security Context of Social Engineering?
By Anna Drescher, Freelance Writer and Mental Health Specialist A few years ago, I received an email from Apple stating that someone had made a purchase from my account. They […] The post What’s The Role of Gaslighting in The…
Generative Ai: The Future of Cloud Security
By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation Generative AI: The Future of Cloud Security As the digital landscape undergoes a relentless […] The post Generative Ai: The Future of Cloud Security…
With The World Distracted, China Stirs Trouble in The Asia Pacific
By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction – Thrilla in Manilla President Biden warned that “conflict and chaos could spread to the Indo-Pacific” from late October, and, amidst the […] The post With The World Distracted, China Stirs Trouble…
Wireless Peripheral Devices – Security Risk, Exploits and Remediation
This article covers the importance of Wireless Peripheral Device Security, the risks involved, and ways to remediate the security exploits. By Prathibha Muraleedhara and Akhilesh Bhangepatil Abstract The advancement of […] The post Wireless Peripheral Devices – Security Risk, Exploits…
Bolstering IoT Cybersecurity Amid an Evolving Landscape: A CEO’s Perspective
By Ron Konezny, President & CEO, Digi International The most cybersecurity-savvy members of an organization are typically not the key decision makers. This disconnect may be one of the reasons […] The post Bolstering IoT Cybersecurity Amid an Evolving Landscape:…
Why Companies Are Still Investing in Tech During an Economic Slowdown
By Luke Wallace, VP of Engineering at Bottle Rocket With rising oil prices, higher interest rates, and an economic downturn plaguing Europe and China throughout 2023, recession is looming in […] The post Why Companies Are Still Investing in Tech…
Why Higher Education Is So Vulnerable to Cyber Attacks — And What to Do
By Zac Amos, Features Editor, ReHack Cyberattacks are a growing problem worldwide as they can cause significant damage to any organization, big or small. Higher education institutions are especially vulnerable, […] The post Why Higher Education Is So Vulnerable to…
What You Need to Know About the Cybersecurity Market in 2024
By Doug Saylors, Partner, Co-lead, Cybersecurity, Information Services Group (ISG) The cybersecurity market offers promising opportunities for real-time threat intelligence through advanced technologies such as AI and ML. It’s also […] The post What You Need to Know About the…
Safeguarding Children in the Era of Big Data
By Ron Kerbs, CEO, Kidas In the ever-evolving landscape of cyberspace, 2023 unveiled a concerning trend: major players in the tech industry, including giants like Meta and Discord, were found […] The post Safeguarding Children in the Era of Big…
Securing Space Infrastructure for US And Allied Collaboration
By Kevin Kelly, CEO and Chairman, Arcfield As the role of satellite communication systems in geopolitical conflicts and critical infrastructure sectors continues to expand, concern regarding the security of satellite […] The post Securing Space Infrastructure for US And Allied…
Understand Cyber Insurance: Rising Risks and How to Right-Size Policies
Cyber insurance can be a tricky part of cybersecurity strategy — here’s what to know in today’s security climate By John Reith, Partner Success Manager at DataStream Cyber Insurance Cyber […] The post Understand Cyber Insurance: Rising Risks and How…
Ransom-War Escalation: The New Frontline in Cyber Warfare
By Nissim Ben Saadon, Director of Innovation, CYREBRO High-profile ransomware attacks against government targets in Costa Rica and Peru last year brought a new twist to the concept of cyberwar: […] The post Ransom-War Escalation: The New Frontline in Cyber…
Reducing Burnout and Increasing SOC Retention: How Leaders Can Improve Their Employees’ Lives and Improve Security
By Kayla Williams, CISO, Devo The significant skills gap and burnout of current personnel are two of the most frequent challenges cybersecurity leaders must solve. ISC(2) estimates there’s still a 3.4 […] The post Reducing Burnout and Increasing SOC Retention: How…
Hyperautomation: Revolutionizing the Security Market
By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) Hyperautomation: Revolutionizing the Security Market In today’s digital age, the security landscape is constantly […] The post Hyperautomation: Revolutionizing the Security Market appeared first…
How The Security of The Cloud’s Supply Chain Will Shift in 2024
What we can expect from advanced threat actor groups in the new year. By Jason Martin, Co-founder and Co-CEO at Permiso Security In 2023, we started to witness a change […] The post How The Security of The Cloud’s Supply…
Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program
The post Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program appeared first on Cyber Defense Magazine. This article has been indexed from Cyber Defense Magazine Read the original article: Webinar: Managing…
New Year, New Consumer Demands in Cybersecurity: Navigating the Landscape of Consumer Expectations and App Developer Responsibility in Mobile App Security
By Alan Bavosa, VP of Security Products, Appdome The significant growth and mass adoption of mobile applications has completely transformed the way users engage with brands today. From managing finances […] The post New Year, New Consumer Demands in Cybersecurity:…
Building a Better Perimeter Defense Strategy to Meet the Challenges of 2024
By Yiyi Miao, Chief Product Officer, OPSWAT In the ever-changing domain of cybersecurity, organizations continue to face multifaceted challenges with protecting their digital assets and infrastructure. A new report, written […] The post Building a Better Perimeter Defense Strategy to…
Enhancing PCI DSS Compliance: The Urgent Need for Risk-Based Prioritization
By Ian Robinson, Chief Architect of Titania Keeping U.S. commercial critical national infrastructure (CNI) organizations safe is vital to national security, and it’s never been more top of mind as […] The post Enhancing PCI DSS Compliance: The Urgent Need…
How Businesses Can Manage Cryptocurrency Fraud
With cryptocurrency payments on the rise, businesses must learn how to safeguard against potential risks. By James Hunt, Subject Matter Expert Payments, Feedzai Businesses across the US are seeking innovative […] The post How Businesses Can Manage Cryptocurrency Fraud appeared…
It’s Time to End the Myth of Untouchable Mainframe Security.
By Al Saurette, CEO, MainTegrity, Most large organizations, including 70% of Fortune 500 companies, rely extensively on mainframes for managing their business and IT infrastructure. However, despite the significant role […] The post It’s Time to End the Myth of…
From the SIEM to the Lake: Bridging the Gap for Splunk Customers Post-Acquisition
By Omer Singer, VP of Strategy, Anvilogic The smoke has cleared on Cisco’s largest acquisition ever: that of Splunk for $28 billion in September. This acquisition has added a new […] The post From the SIEM to the Lake: Bridging…
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023
Don’t wait until it’s too late – get cyber insurance today and secure your business for tomorrow. By Zia Muhammad, Cyber Risk Advisor, Onpoint Insurance Services In the current era […] The post Cyber Insurance: A Smart Investment to Protect…
Cyber Resilience – Beyond Cyber Security
In a world where 100% security is not possible, we need to be resilient as we strive to be secure. By James Gorman, Hard2hack.com The evolving landscape of cyber threats […] The post Cyber Resilience – Beyond Cyber Security appeared…
An Interview With Jeffrey Stephens
🔒 Dive into the electrifying world of cyber espionage and the ghost chip with Jeffrey S. Stephens on @CyberDefenseTV! 💻 Unravel the gripping tale of Nick Reagan’s pursuit of “Enemies […] The post An Interview With Jeffrey Stephens appeared first…
Cybersecurity Preparedness 2024
By Chris Leach, Board Advisor for Judy Security The new year is just around the corner. We have had a great Thanksgiving meal and soon our thoughts will turn to […] The post Cybersecurity Preparedness 2024 appeared first on Cyber…
Digital Technologies Power Global Operations but Present Growing Risks
By Charlie Regan, CEO, Nerds on Site As more and more industries and businesses turn to digital technologies in order to power their operations, cyber-attacks present a larger and more […] The post Digital Technologies Power Global Operations but Present…
Evolution and Escalation of Cybersecurity Threats
The Darwinian Effect in the Threat Community By Augusto Barros, Vice President Cyber Security Evangelist at Securonix Among the typical predictions for the upcoming new year, we often see something […] The post Evolution and Escalation of Cybersecurity Threats appeared…
Reshaping the Focus of Cybersecurity
Key Insights from the International Counter Ransomware Initiative Statement By Todd Thorsen, Chief Information Security Officer, CrashPlan Earlier in November, media outlets widely reported the contents of a remarkable joint […] The post Reshaping the Focus of Cybersecurity appeared first…
MGM & Caesars Cyberattacks: Lessons Learned
By Tim Callan, Chief Experience Officer, Sectigo In the aftermath of the MGM and Caesars cyberattacks, many IT professionals are probably asking themselves, am I next? What lessons can businesses […] The post MGM & Caesars Cyberattacks: Lessons Learned appeared…
NIS 2: From Obligation to Opportunity
By Jacques de La Rivière, CEO, Gatewatcher The world of cybersecurity is constantly evolving; not only in talent, products, and technologies, but also in regulatory requirements. As cyber threats evolve […] The post NIS 2: From Obligation to Opportunity appeared…
Top 6 Security Challenges of SMEs
By Michal Gil, Head of Product, CybeReady Small to Medium Enterprises (SMEs) are vital for innovation and economic growth, and their role in larger supply chains makes them an attractive […] The post Top 6 Security Challenges of SMEs appeared…
Is 2024 the Year of Cloud Repatriation?
By Eyal Arazi, cloud security manager at Radware Eyal Arazi, cloud security manager at Radware, looks at why organizations once committed to cloud-first and cloud-only strategies are now reevaluating their […] The post Is 2024 the Year of Cloud Repatriation?…
How A Strong Digital Culture Is the Foundation For Successful Metaverse Exploration
Businesses must become digital-first to understand the emerging realm of the metaverse and develop the innovations that will drive success there. By Jaime McMahon, CDO, LineZero The metaverse is open […] The post How A Strong Digital Culture Is the…
Beyond Traditional Cyber Defences: The Rise of Outcome-Based Security In Modern Business
By Paul Brucciani, Cyber Security Advisor at WithSecure™ Cyber security is no longer just about keeping systems and devices safe, it’s also become central in enabling business to achieve their […] The post Beyond Traditional Cyber Defences: The Rise of…
Ai, Cybersecurity Awareness, And Communication
Moving beyond the hype, are AI cybersecurity solutions as advanced as they claim? By John Trest, Chief Learning Officer, VIPRE Security Group The emergence of numerous AI-driven cybersecurity products emphasizes […] The post Ai, Cybersecurity Awareness, And Communication appeared first…
Addressing Bias in Insider Risk Monitoring
By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […] The post Addressing Bias in Insider Risk Monitoring appeared…
AI in DevSecOps: Moving from A Co-Pilot to An Autopilot
By Stephen Chin, VP of Developer Relations, JFrog What do autonomous driving and software (SW) development have in common? At first glance, not much. But when taking a closer look […] The post AI in DevSecOps: Moving from A Co-Pilot…
Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game
If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure across all sectors, and “be resilient” to the constant onslaught […] The post Prevention Strategies Inevitably Become a Constant Cat-and-Mouse…
AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users
Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at Jumio While AI-driven automation brings benefits, it also gives hackers […] The post AI-Enhanced Identity Fraud: A Mounting Threat to…
AI: The Human Touch in Cybersecurity Recruitment
Harnessing the Digital Scout for Cybersecurity’s Future By Darrin Straff, Senior Staffing Consultant, NinjaJobs Introduction: In the digital age, where cybersecurity threats are ever-evolving, AI’s role in strengthening our defenses […] The post AI: The Human Touch in Cybersecurity Recruitment…
Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors
A Vital Set of Cybersecurity Best Practices By John Funk, Creative Consultant, SevenAtoms A new cybersecurity mandate being rolled out by the Pentagon has implications that reach beyond the military […] The post Why Cybersecurity Maturity Model Certification (CMMC) Matters…
The Tech Jobs That AI Will Not Disrupt
By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to […] The post The Tech Jobs That AI Will Not…
3 New Risks That CISOs Will Face in 2024
By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere are increasingly vigilant about how their data is being gathered […] The post 3 New Risks That CISOs Will Face…
How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance
Steps To Implement Cyber Controls and Processes By Juliana Spofford, General Counsel and Chief Privacy Officer, Aidentified In today’s tech world, it is often difficult to determine which businesses you […] The post How Small and Mid-Sized Businesses Can Achieve…
Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments
By Victor Atkins, Director | Cybersecurity, 1898 & Co. The rise in the age of digitalization has provided numerous benefits for modern society, from the ability to conduct a telehealth […] The post Closing the Gap: Safeguarding Critical Infrastructure’s IT…
The Crumbling Castle
By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy involved building a strong perimeter around the corporate network, like […] The post The Crumbling Castle appeared first on Cyber…
The Cybersecurity Bridge: A Necessary Connection for IT and Communications
By Jeff Hahn, principal of Hahn, and Kenneth Holley, Principal and chairman of Silent Quadrant With the increasing unpredictability and sophistication of cyber threats, IT and communications departments must align […] The post The Cybersecurity Bridge: A Necessary Connection for…
Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines
SEC’s New Guidelines Prompt Proactive Cyber Risk Management By Meghan Maneval, Director of Technical Product Management at RiskOptics Recently, the Securities and Exchange Commission (SEC) adopted rules about the handling […] The post Three Things to Know About the New…
Striking The Right Balance: Cloud and Cyber Priorities for SMEs
By Mark Allen, Head of cyber, CloudCoCo As small and medium-sized enterprises (SMEs) embark on their digitalization journey, they face a crucial dilemma: Should they prioritize the adoption of cloud […] The post Striking The Right Balance: Cloud and Cyber…
Shifting Left Means Shifting Smart: Managing Software Risk With ASPM
By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up software delivery, security practices have had to evolve. Development teams […] The post Shifting Left Means Shifting Smart: Managing Software…
Protecting Critical Infrastructure from Cyber Attack
The enemy is using cyber weapons that are hard to track and even harder to fully attribute to an adversary, companies need to act now By Richard Staynings, Chief Security […] The post Protecting Critical Infrastructure from Cyber Attack appeared…
Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead
By Craig Burland, CISO, Inversion6 In a world driven by technology, innovation and rapid change, companies often find themselves touting the mantra of “ruthless prioritization.” The idea sounds pragmatic: with […] The post Ruthless Prioritization Is a Myth: Aim For…
Ditch the Worry – Switch to Secure WhatsApp Alternative
By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it has been designed as a personal and social messaging service. […] The post Ditch the Worry – Switch to Secure…
What the Government Can Learn from the Private Sector in Pursuit of Zero Trust
By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order on Improving the Nation’s Cybersecurity, outlining one of the administration’s […] The post What the Government Can Learn from the…
Protecting Your Business and Personal Data
By Brian Lonergan, VP of Product Strategy, Identity Digital October celebrated National Cybersecurity Awareness Month (NCSAM), a time when public and private sectors, along with tribal communities, join forces to […] The post Protecting Your Business and Personal Data appeared…
Navigating Secure Adoption of AI Across Government and Connected Infrastructure
By Gaurav (G.P.) Pal, Founder and CEO, stackArmor This year, artificial intelligence has exploded in popularity across all sectors and industries — including the federal government. AI is being used […] The post Navigating Secure Adoption of AI Across Government…
North Korea–Russia Summit
A new alliance in cyberspace? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction Last month, North Korean leader Kim Jong Un took a rare trip beyond his country’s borders – […] The post North Korea–Russia Summit appeared first on Cyber…
In Pursuit of a Passwordless Future
By Rob Jenks, Senior Vice President of Corporate Strategy, Tanium Many computer users dream of a day when the industry can move past its reliance on passwords to reach a […] The post In Pursuit of a Passwordless Future appeared…
Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT
By Dr. Torsten Staab, PhD, RTX Principal Technical Fellow From September 5th to September 8th of 2023, Billington Cybersecurity hosted its 14th annual Cybersecurity Summit in Washington, D.C. Among my […] The post Insights from Billington Cybersecurity Summit 2023: The…
It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence
By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware to tried and true brute force attacks. At this point, […] The post It’s Time to Tear Down the Barriers…
Building For a More Secure Future: How Developers Can Prioritize Cybersecurity
By Jeremy Butteriss, EGM Ecosystem and Partnerships, Xero An iconic moment in the rise of ecosystems was Steve Ballmer on stage saying ‘developers, developers, developers’ at the 1999 Microsoft .NET […] The post Building For a More Secure Future: How…
How to Create a Threat Hunting Program for Your Business
By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s job is to proactively seek out potential problems and stop […] The post How to Create a Threat Hunting Program…
How To Improve Security Capacities of The Internet of Things?
By Milica D. Djekic The security of the Internet of Things (IoT) is one of the main challenges of today. Many IoT assets could get an easy target to cyber […] The post How To Improve Security Capacities of The…
Developers Hold the New Crown Jewels. Are They Properly Protected?
By Aaron Bray, CEO. Phylum Cybersecurity has changed dramatically in the last four years. During the pandemic, organizations around the globe found themselves faced with accelerating digital transformation initiatives, remote […] The post Developers Hold the New Crown Jewels. Are…
Expect to Fail: How Organizations Can Benefit from a Breach
By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions in digital security. As CISO, you bear primary responsibility for […] The post Expect to Fail: How Organizations Can Benefit…
When the Enemy Is DDoS, Holistic Protection Is a Must
An infinite variety of attack methods require customizable solutions. By Sean Newman, VP/Product Management, Corero Sun Tzu was an exceptional general, strategist, and philosopher, and certainly one of the most […] The post When the Enemy Is DDoS, Holistic Protection…
Keeping SaaS Data Under Wraps
A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business of image and reputation don’t want to get bad publicity. […] The post Keeping SaaS Data Under Wraps appeared first…
Data Sanitization for End-Of-Use Assets
Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe are prioritizing Cybersecurity efforts as threats from cyber criminals are […] The post Data Sanitization for End-Of-Use Assets appeared first…
SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK
Top cybersecurity leaders in the NightDragon Advisor Council provide perspective on 2023 trends and 2024 spending outlook As our digital age continues to expand and become ubiquitous across every piece […] The post SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS…