Phishing isn’t what it used to be. It’s no longer fake emails with bad grammar and sketchy links. With AI, modern phishing attacks have become slicker, more convincing, and dangerously… The post Why Enterprises Need Preemptive Cybersecurity to Combat Modern…
Category: Cyber Defense Magazine
With Ransomware Attacks Surging, Eliminate Silos and Tap Genai to Strengthen Threat Intelligence
After a brief lull in ransomware attacks following the LockBit disruption earlier this year, ransomware attacks spiked again in the second quarter of 2024 and are showing no signs of abating. Extortion… The post With Ransomware Attacks Surging, Eliminate Silos and Tap…
You Can’t Protect What You Can’t See
A business ecosystem is a borderless entity. Where organizations operate across vast, global networks, achieving a comprehensive view of their digital operations is a major challenge. Security leads, faced with… The post You Can’t Protect What You Can’t See appeared…
Innovator Spotlight: CSide
Securing the Browser’s Blind Spot By Victoria Hargrove, CDM Reporter What CSide Does Most security stacks fortify servers, databases, and internal apps. CSide (Client-side Development, Inc. aka c/side) targets the… The post Innovator Spotlight: CSide appeared first on Cyber Defense…
Cross-domain Solutions: The Present and Future of a Growing Industry
Cross-domain solutions (CDS) consist of the secure exchange of information between security domains. This type of solution, which emerged as a technological answer to the need to share data between… The post Cross-domain Solutions: The Present and Future of a…
CMMC 2.0 Final Rule Released – Get Prepared Now!
In a significant step to secure the defense industrial base (DIB), the Department of Defense (DoD) has officially released the long-anticipated Cybersecurity Maturity Model Certification (CMMC) Final Rule, which was… The post CMMC 2.0 Final Rule Released – Get Prepared…
Black Hat Ignites Under Vegas Lights
Driving through the quiet, endless beauty of the Nevada desert, I let the raspy voice of Jim Morrison carry me forward. “The End” played as the final song before I… The post Black Hat Ignites Under Vegas Lights appeared first…
Is the Cyber Resilience Act the Biggest Thing to Hit Compliance Since GDPR?
There’s a lot of noise around compliance. New regulations seem to pop up every year, each promising to fix the ever-growing list of security problems that come with the digital… The post Is the Cyber Resilience Act the Biggest Thing…
Cybersecurity Wake-Up Call: Why All Businesses Must Prepare for the Inevitable Attack
Cybersecurity has emerged as a critical and ongoing battle against a dynamic and pervasive global threat. The landscape is evolving rapidly, with adversaries increasingly gaining ground in this ongoing struggle…. The post Cybersecurity Wake-Up Call: Why All Businesses Must Prepare…
Digital Nomads and Cybersecurity: Navigating the New Frontier of Work
We live in an era where your next big idea could come from an employee working out of a cafe in Tokyo or on the beach in Bali. The digital… The post Digital Nomads and Cybersecurity: Navigating the New Frontier…
Don’t Wait Too Long to Patch: How Organizations Can Stay Ahead of Zero-Day Exploits
Among the variety of cyber-attacks that we witness happening around us, Zero-day attacks are remarkably insidious in nature. Due to the fact that these attacks exploit the unknown vulnerabilities, zero-day… The post Don’t Wait Too Long to Patch: How Organizations…
Empowering The Soc: Stop Detecting Potential Threats, Start Signaling Real Attacks
The cybersecurity landscape is constantly evolving, and security operations centers (SOCs) are feeling the pressure to stay ahead of increasingly sophisticated attackers. Numerous SOCs struggle to keep pace with the… The post Empowering The Soc: Stop Detecting Potential Threats, Start…
Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation
The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment. It’s an important metric in security because criminals… The post Data Is a Dish Best Served Fresh: “In…
Healthcare Organizations at Risk: Managing Human Vulnerability in Cybersecurity
The battle against cybercrime continues to be a significant topic for organizations across all industries, however the threat to the health care industry is possibly the most serious. Financial losses… The post Healthcare Organizations at Risk: Managing Human Vulnerability in…
How Dealerships Can Protect Their Customers’ Financial Data
Dealerships handle sensitive information, such as credit applications and personal financial records, daily. A data breach can lead to profound consequences for both the dealership and its customers. Dealerships can… The post How Dealerships Can Protect Their Customers’ Financial Data…
Why Enterprises Need Preemptive Cybersecurity to Combat Modern Phishing
Phishing isn’t what it used to be. It’s no longer fake emails with bad grammar and sketchy links. With AI, modern phishing attacks have become slicker, more convincing, and dangerously… The post Why Enterprises Need Preemptive Cybersecurity to Combat Modern…
Cyber Security Simulation Training Mistakes That CISOs Must Avoid
Your team’s ability to identify phishing attempts in their inboxes has the potential to make or break your entire security posture, which is why having an effective training program in… The post Cyber Security Simulation Training Mistakes That CISOs Must…
How Secure Is the Software Supply Chain? Less Secure Than You Might Think.
Software is the invisible infrastructure of our world, powering everything from critical systems to everyday devices. But its ubiquity makes it a prime target. The question is not just how… The post How Secure Is the Software Supply Chain? Less…
How to Develop a Business Continuity Plan for Cyber Security: A Step-by-Step Guide
The figures are appalling – 60% of small businesses fail within six months of a cyber-attack. Cyber attackers are all around us, and they leave devastating scars. Modern enterprises are… The post How to Develop a Business Continuity Plan for…
Vegas, Vulnerabilities, and Voices: Black Hat and Squadcon 2025
The week of August 4th, I had the opportunity to attend two exciting conferences in the cybersecurity world: Black Hat USA 2025 and Squadcon which were held in Las Vegas…. The post Vegas, Vulnerabilities, and Voices: Black Hat and Squadcon…