This article has been indexed from Cyber Defense Magazine Bosch AIShield was recently unveiled at CES 2022 as an industry-first & patented AI Security SaaS offering to […] The post Bosch Aishield To Protect AI Systems and Bolster Digital Trust…
Category: Cyber Defense Magazine
The Future of MFA
This article has been indexed from Cyber Defense Magazine Going Beyond Privileged Accounts By François Amigorena, Founder & CEO, IS Decisions Given the current global cyber threat […] The post The Future of MFA appeared first on Cyber Defense Magazine.…
Drones And the Battlefield
This article has been indexed from Cyber Defense Magazine How Drones Are Transforming Military Operations By Dr. Shaun Passley, Founder, ZenaDrone Recent years have seen a substantial […] The post Drones And the Battlefield appeared first on Cyber Defense Magazine.…
Privileged Access Management as a Key Technology for Critical Environments
This article has been indexed from Cyber Defense Magazine By Dr. Heiko Klarl, Chief Marketing and Sales Officer, iC Consult Closed gas stations disrupted flight schedules, a […] The post Privileged Access Management as a Key Technology for Critical Environments…
Ethical AI – How is AI Redefining the Insurance Industry?
This article has been indexed from Cyber Defense Magazine By Antoine de Langlois, Responsible AI Data Scientist at Zelros When Cybersecurity meets Artificial Intelligence, companies and organizations […] The post Ethical AI – How is AI Redefining the Insurance Industry?…
Cybersecurity’s New Frontier: Space
This article has been indexed from Cyber Defense Magazine By Duncan Jones, Head of Cybersecurity, Quantinuum Ground-to-space communication is not an area that immediately comes to mind […] The post Cybersecurity’s New Frontier: Space appeared first on Cyber Defense Magazine.…
Hacking The Cybersecurity Field: How To Get Into Cyber As A Young Adult
This article has been indexed from Cyber Defense Magazine “What do you want to be when you grow up?” was the question I heard over and over […] The post Hacking The Cybersecurity Field: How To Get Into Cyber As…
The Best Cyber Security Jobs in The UK According to Data
This article has been indexed from Cyber Defense Magazine By Karim Adib, Data Analyst, The SEO Works According to a report commissioned by the UK government, 82% […] The post The Best Cyber Security Jobs in The UK According to…
Why And How to Eliminate Security’s Biggest Blind Spot: Transport Layer Security (TLS)
This article has been indexed from Cyber Defense Magazine Gigamon VP breaks down how to eliminate TLS, and considerations for a decryption and encryption approach By Bassam […] The post Why And How to Eliminate Security’s Biggest Blind Spot: Transport…
Preventing Ransomware Attacks On Industrial Networks
This article has been indexed from Cyber Defense Magazine By Michael Yehoshua, VP Marketing, SCADAfence Ransomware Works That’s the simplest way to explain why incidents of ransomware […] The post Preventing Ransomware Attacks On Industrial Networks appeared first on Cyber…
Interview with Morten Kjaersgaard, CEO of Heimdal Security on How Cybersecurity Businesses are Tackling the Ukraine Crisis
This article has been indexed from Cyber Defense Magazine By Morten Kjaersgaard, CEO, Heimdal Security How are cybersecurity companies reacting to the Russia-Ukraine conflict and what would […] The post Interview with Morten Kjaersgaard, CEO of Heimdal Security on How…
True Cybersecurity Requires a Shift to A Data-Centric Philosophy
This article has been indexed from Cyber Defense Magazine By Brian Platz, CEO and co-founder, Fluree A target-rich environment While news of cyber attacks emanating from Russia’s […] The post True Cybersecurity Requires a Shift to A Data-Centric Philosophy appeared…
Data-centric Security: Defense in Depth
This article has been indexed from Cyber Defense Magazine By Amit Shaked, CEO, Laminar Last year, organizations saw the highest average cost of a data breach in […] The post Data-centric Security: Defense in Depth appeared first on Cyber Defense…
How To Establish SAP Security
This article has been indexed from Cyber Defense Magazine By Christoph Nagy, CEO, SecurityBridge Malicious external cyber-threats certainly grab the headlines and leave businesses with no doubt […] The post How To Establish SAP Security appeared first on Cyber Defense…
Preventing Ransomware Attacks On Industrial Networks
This article has been indexed from Cyber Defense Magazine By Michael Yehoshua, VP Marketing, SCADAfence Ransomware Works That’s the simplest way to explain why incidents of ransomware […] The post Preventing Ransomware Attacks On Industrial Networks appeared first on Cyber…
Why Access Control Is Critical in The Path to Cyber Insurance Readiness
This article has been indexed from Cyber Defense Magazine Combatting the challenges of cyber insurance By Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea Cyber […] The post Why Access Control Is Critical in The Path to Cyber…
The Countdown Has Started on Secure IoT Compliance
This article has been indexed from Cyber Defense Magazine By Kyle Haefner, Lead Security Architect, CableLabs, Bruno Johnson, CEO, Cascoda, Joe Lomako, Cybersecurity Lead, TÜV SÜD UK […] The post The Countdown Has Started on Secure IoT Compliance appeared first…
Tips for Implementing HITRUST for Healthcare Providers
This article has been indexed from Cyber Defense Magazine By Philip Jones, Mazars, Director of Security – Chief Information Security Officer (CISO), Data Privacy Officer (DPO) for […] The post Tips for Implementing HITRUST for Healthcare Providers appeared first on…
5 Key Learnings from Intel’s 2021 Product Security Report
This article has been indexed from Cyber Defense Magazine By Jerry Bryant, Senior Director of Security Communications and Incident Response at Intel As security threats continue to […] The post 5 Key Learnings from Intel’s 2021 Product Security Report appeared…
Defending Your Remote Workforce with Zero Trust Security
This article has been indexed from Cyber Defense Magazine By Raul Popa, CEO & Co-founder, TypingDNA To truly understand zero trust, you must rethink your mindset of […] The post Defending Your Remote Workforce with Zero Trust Security appeared first…
Understanding Russian Hacking Tactics to Power Up Security in the Energy Sector
This article has been indexed from Cyber Defense Magazine By Chip Epps, VP of Product Marketing, OPSWAT Every critical infrastructure sector depends on energy to operate, yet […] The post Understanding Russian Hacking Tactics to Power Up Security in the…
Gone Phishing: How Ransomware, Log4j, and Other Exploits Use Your Network to Catch the Big Fish
This article has been indexed from Cyber Defense Magazine Ransomware and Log4j are the latest examples of the ways cyber criminals leverage security weaknesses to spread onto […] The post Gone Phishing: How Ransomware, Log4j, and Other Exploits Use Your…
Shrinking the Cyber Skills Gap by Taking Advantage of Diversity, Unique Opportunities, and Automation
This article has been indexed from Cyber Defense Magazine By Jon Check, senior director of cyber protection solutions, Raytheon Intelligence & Space As cyber threats continue to […] The post Shrinking the Cyber Skills Gap by Taking Advantage of Diversity,…
Vulnerable Today, Hacked Tomorrow: How a Lack of OT Cybersecurity Affects Critical Infrastructure
This article has been indexed from Cyber Defense Magazine By Ian Bramson, Global Head of Industrial Cybersecurity at ABS Group Did you know almost 50% of ICS […] The post Vulnerable Today, Hacked Tomorrow: How a Lack of OT Cybersecurity…
It’s time for Internet Providers to Become Primary Security Providers
This article has been indexed from Cyber Defense Magazine Consumers want cybersecurity protection and they consider their CSPs as potential partners By Barry Spielman, Director of Product […] The post It’s time for Internet Providers to Become Primary Security Providers…
Will Multi-Factor Authentication (MFA) Implementation Protect Countries from Cybercriminals?
This article has been indexed from Cyber Defense Magazine By Marcin Szary, CTO and co-founder, Secfense American Login.gov service, the UK National Health Services Login application, the […] The post Will Multi-Factor Authentication (MFA) Implementation Protect Countries from Cybercriminals? appeared…
Why Do You Need a Malware Sandbox?
This article has been indexed from Cyber Defense Magazine By ANY.RUN Team To solve the problem of identifying previously unknown malware samples help malware sandboxes – protection […] The post Why Do You Need a Malware Sandbox? appeared first on…
3 Best Practices to Avoid Inevitable Ransomware Attacks
This article has been indexed from Cyber Defense Magazine Tips to mitigate and protect against the ongoing threats of ransomware By Jesper Zerlang, CEO, LogPoint The total […] The post 3 Best Practices to Avoid Inevitable Ransomware Attacks appeared first…
The Benefits of Hyperautomation
This article has been indexed from Cyber Defense Magazine By Nathan Hull, Principal Solutions Architect, Technologent Hyperautomation – in short, is the process of automating business automation. […] The post The Benefits of Hyperautomation appeared first on Cyber Defense Magazine.…
Why MFA Alone Isn’t Enough for True Cybersecurity
This article has been indexed from Cyber Defense Magazine By Bojan Simic, Co-Founder, Interim CEO & CTO, HYPR Multi-factor authentication (MFA) was once a foreign terminology, but […] The post Why MFA Alone Isn’t Enough for True Cybersecurity appeared first…
Can Your Cybersecurity Culture Stand Up to the Latest Spear Phishing Techniques?
This article has been indexed from Cyber Defense Magazine By Josh Yavor, Chief Information Security Officer, Tessian Gone are the days of bulk spear phishing attacks, where […] The post Can Your Cybersecurity Culture Stand Up to the Latest Spear…
Cyber Crime Is on The Rise and These Experts Have the Knowledge You Need
This article has been indexed from Cyber Defense Magazine By Jon Clemenson, Director of Information Security, TokenEx Nearly every day, there’s news about another major cyberattack on […] The post Cyber Crime Is on The Rise and These Experts Have…
KB4-CON 2022: Awareness, Behavior and Culture: Trip Report
This article has been indexed from Cyber Defense Magazine After two years of virtual events, I was thrilled to attend KB4-CON 2022, run by KnowBe4, Inc., which […] The post KB4-CON 2022: Awareness, Behavior and Culture: Trip Report appeared first…
How Covid-19 Changed Advertising Forever
This article has been indexed from Cyber Defense Magazine By Bernie Brode, product researcher at Microscopic Machines There has been much written about how the Covid-19 pandemic […] The post How Covid-19 Changed Advertising Forever appeared first on Cyber Defense…
Darkweb Monitoring
This article has been indexed from Cyber Defense Magazine An Indispensable Element of Cyber Risk Management Strategy By Kaustubh Medhe, Head of Research and Intelligence, Cyble As […] The post Darkweb Monitoring appeared first on Cyber Defense Magazine. Read the…
9 Ways Social Media Sabotages Your Cybersecurity
This article has been indexed from Cyber Defense Magazine By Alex Lysak, CEO of Scanteam Social media has become one of the most common ways to spend […] The post 9 Ways Social Media Sabotages Your Cybersecurity appeared first on…
Cybersecurity and Other Top Risk Factors in 2022
This article has been indexed from Cyber Defense Magazine By Dan Zitting, Chief Product & Strategy Officer at Diligent As we pass the second anniversary of the […] The post Cybersecurity and Other Top Risk Factors in 2022 appeared first…
The Security Vulnerabilities Facing Remote Workforces
This article has been indexed from Cyber Defense Magazine An organization’s security is only as good as its weakest link By Daniel Hofmann, CEO, Hornetsecurity With work […] The post The Security Vulnerabilities Facing Remote Workforces appeared first on Cyber…
How Companies Can Protect the Country from Acts Of Cyberwarfare
This article has been indexed from Cyber Defense Magazine By Matt Lindley, CISO and COO, NINJIO Immediately before the Russian invasion of Ukraine, a form of “wiper” […] The post How Companies Can Protect the Country from Acts Of Cyberwarfare…
Protecting Critical Infrastructure from Cyberattacks Essential if U.S. is to Remain a Superpower
This article has been indexed from Cyber Defense Magazine By Jeff Engle, Chairman and President of Conquest Cyber The playbook for geopolitical dominance is being re-written thanks […] The post Protecting Critical Infrastructure from Cyberattacks Essential if U.S. is to…
How To Verify Who Is Who in The Digital Space Without Compromising Privacy?
This article has been indexed from Cyber Defense Magazine By Nima Schei, MD Founder and CEO, Hummingbirds AI Inc. Digital interactions are rapidly increasing as more and […] The post How To Verify Who Is Who in The Digital Space…
The Quantum Tipping Point
This article has been indexed from Cyber Defense Magazine Fixing Cryptography Before It Is Broken By Carmen Kempka, Head of Corporate Technology, WIBU-SYSTEMS AG Ever since Peter […] The post The Quantum Tipping Point appeared first on Cyber Defense Magazine.…
4 Ways to Improve Azure Active Directory Security
This article has been indexed from Cyber Defense Magazine Why identity has emerged as the security perimeter in hybrid deployments By Guido Grillenmeier, Chief Technologist at Semperis […] The post 4 Ways to Improve Azure Active Directory Security appeared first…
Fighting The International Cyber War with Ai
This article has been indexed from Cyber Defense Magazine As Ukraine fights to maintain a stronghold on its besieged capital, cyberattacks are escalating. Governments on both sides […] The post Fighting The International Cyber War with Ai appeared first on…
Half of Organizations Have Experienced a Cyber Attack on Their Critical IT Assets
This article has been indexed from Cyber Defense Magazine By Diem Shin, Product Marketing Lead at Telos Corporation Today’s organizations are cloud-centric and are more connected than […] The post Half of Organizations Have Experienced a Cyber Attack on Their…
Three Ways IP Data Enhances Cyber Security
This article has been indexed from Cyber Defense Magazine By Jonathan Tomek, VP of Research and Development, Digital Envoy Cyber security professionals were never worry-free; there are […] The post Three Ways IP Data Enhances Cyber Security appeared first on…
Cybersecurity, Especially in Critical Infrastructure and State Government, Is A Huge Issue Right Now
This article has been indexed from Cyber Defense Magazine There is little doubt that continued effort at all levels across infrastructure and government is required to ensure […] The post Cybersecurity, Especially in Critical Infrastructure and State Government, Is A…
Log4j Showed Us That Public Disclosure Still Helps Attackers.
This article has been indexed from Cyber Defense Magazine Public disclosure is still a bit of a mess By Alex Haynes, CISO, CDL At 2:25 pm on […] The post Log4j Showed Us That Public Disclosure Still Helps Attackers. appeared…
Too Hot to Handle:The case for Zero Trust and SASE
This article has been indexed from Cyber Defense Magazine By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance on legacy […] The post Too Hot to Handle:The case for Zero Trust and SASE…
Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service industry
This article has been indexed from Cyber Defense Magazine Technological progress also enhances the danger of cyber threats By C. Max Farrell¸ senior technical marketing specialist & […] The post Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service…
Executive Order Instructs Certain Organizations to Improve Their Cybersecurity Stance
This article has been indexed from Cyber Defense Magazine Financial Institutions Should Boost Their Efforts to Thwart Cyberattacks By Bob Thibodeaux, Chief Information Security Officer, DefenseStorm Consumer […] The post Executive Order Instructs Certain Organizations to Improve Their Cybersecurity Stance…
Redefining Resilience in The New World of Work
This article has been indexed from Cyber Defense Magazine By Andrew Lawton, CEO of Reskube Ltd We are entering a new world of work. The Covid-19 pandemic […] The post Redefining Resilience in The New World of Work appeared first…
Lessons Learned: In the Principle Of “Least Privilege,” Where Do Companies Fall Short?
This article has been indexed from Cyber Defense Magazine By Raj Dodhiawala, President, Remediant Lateral movement using compromised admin credentials is integral to almost all ransomware and […] The post Lessons Learned: In the Principle Of “Least Privilege,” Where Do…
How to Fix Mid-Market Security Using Intelligent Automation and AI
This article has been indexed from Cyber Defense Magazine By Guy Moskowitz, CEO, Coro Market forces are working against medium-sized businesses, leaving companies that don’t have large, […] The post How to Fix Mid-Market Security Using Intelligent Automation and AI…
5 Ways Cybersecurity Will Change In 2022
This article has been indexed from Cyber Defense Magazine By Jaime Coreano, Vice President of Sales – Flexxon The annual cost of cybercrime is set to hit […] The post 5 Ways Cybersecurity Will Change In 2022 appeared first on…
Biggest Cyber Trend in 2022
This article has been indexed from Cyber Defense Magazine You Can’t Fix Stupid By Guy Rosefelt, CPO, Sangfor Technologies Stop me if you have heard this one: […] The post Biggest Cyber Trend in 2022 appeared first on Cyber Defense…
On The Frontline in The War Against Hackers
This article has been indexed from Cyber Defense Magazine By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift toward remote […] The post On The Frontline in The War Against Hackers appeared first…
Are You Prepared for the New Normal of Jekyll and Hyde Data?
This article has been indexed from Cyber Defense Magazine An organization’s data and secrets are simultaneously its greatest assets and its greatest risks. By Howard Ting, CEO, […] The post Are You Prepared for the New Normal of Jekyll and…
How To Defend Railway Subsystems from Targeted Cyber-Attacks
This article has been indexed from Cyber Defense Magazine By Michael Cheng, Director at TXOne Networks & C. Max. Farrell, Senior Technical Marketing Specialist at TXOne Networks […] The post How To Defend Railway Subsystems from Targeted Cyber-Attacks appeared first…
5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem
This article has been indexed from Cyber Defense Magazine Why Organizations Need to Secure Directory Services in a Hybrid Deployment from Attack Paths By Justin Kohler, Director […] The post 5 Reasons Organizations Need Comprehensive AD Security Across Cloud and…
Directed Analytics – The Future of Data Management
This article has been indexed from Cyber Defense Magazine By Simon Rolph, CEO & Founder of Such Sweet Thunder The world as we know it has changed […] The post Directed Analytics – The Future of Data Management appeared first…
Phishing Techniques in Disguise: What to Look for And Why You Should
This article has been indexed from Cyber Defense Magazine By Rotem Shemesh, Lead Product Marketing Manager, Security Solutions, at Datto Phishing is a familiar concept to cybersecurity […] The post Phishing Techniques in Disguise: What to Look for And Why…
Top 10 Reasons Cyber Defense Firms Should Hire Veterans
This article has been indexed from Cyber Defense Magazine Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring to […] The post Top 10 Reasons Cyber Defense Firms Should Hire Veterans appeared…
Why the Future of Threat Detection and Prevention is Unified Security and Risk Analytics
This article has been indexed from Cyber Defense Magazine Why True AI/ML Capabilities are Essential for Next-Gen Risk Analytics By Sanjay Raja, VP of Product Marketing at […] The post Why the Future of Threat Detection and Prevention is Unified…
Tips And Trends for OT Cybersecurity In 2022: More SOAR, Cyber Hygiene And Renewed Compliance
This article has been indexed from Cyber Defense Magazine By Peter Lund, Vice President of Product Management at OT security company Industrial Defender As of February 2022, […] The post Tips And Trends for OT Cybersecurity In 2022: More SOAR,…
3 Cybersecurity Certainties for 2022
This article has been indexed from Cyber Defense Magazine By Bill Moore, XONA As businesses transitioned to hybrid work models in 2021, critical integrations between IT and […] The post 3 Cybersecurity Certainties for 2022 appeared first on Cyber Defense…
Is XDR The Right Solution for Today’s Security Threats?
This article has been indexed from Cyber Defense Magazine Defining XDR’s Role in the Security Stack By Steve Garrison, VP Marketing, Stellar Cyber XDR and Open XR […] The post Is XDR The Right Solution for Today’s Security Threats? appeared…
Have We Learned from Our Past Mistakes to Prevent Future Cyberattacks?
This article has been indexed from Cyber Defense Magazine By Marc Packler, President, CISO Advisory, Silent Quadrant Gartner’s article, “The Top Cybersecurity Predictions for 2021-2022,” contains a […] The post Have We Learned from Our Past Mistakes to Prevent Future…
How to strengthen cyber resilience with Unified BCDR
This article has been indexed from Cyber Defense Magazine By Joe Noonan, General Manager, Unitrends and Spanning Cybercrime and hybrid work environments prompted by the pandemic have […] The post How to strengthen cyber resilience with Unified BCDR appeared first…
Don’t Become a Horrible Headline: Some Tips on Redesigning Your Threat Posture for The 2022 Threat Landscape
This article has been indexed from Cyber Defense Magazine By Omar Zarabi, Founder and CEO, Port53 Technologies As in previous years, the DefCon of the cybersecurity industry […] The post Don’t Become a Horrible Headline: Some Tips on Redesigning Your…
The 7 Top Cybersecurity Conferences for 2022
This article has been indexed from Cyber Defense Magazine While there are many more cybersecurity tradeshows events and gatherings these are my seven favorite for 2022 in […] The post The 7 Top Cybersecurity Conferences for 2022 appeared first on…
Ransomware — Encrypt Your Data Before Others Do
This article has been indexed from Cyber Defense Magazine Don’t let them look at your data. By Robert Freudenreich, CTO and Founder, Secomba GmbH | Boxcryptor A […] The post Ransomware — Encrypt Your Data Before Others Do appeared first…
Endpoint Malware and Ransomware Volume Already Exceeded 2020 Totals by the End of Q3 2021
This article has been indexed from Cyber Defense Magazine By Corey Nachreiner, CSO, WatchGuard Technologies The cybersecurity landscape of today is constantly evolving and threat actors are […] The post Endpoint Malware and Ransomware Volume Already Exceeded 2020 Totals by…
The Role of The CFO In Enterprise Cyber Security
This article has been indexed from Cyber Defense Magazine By Glenn Murray, CEO at Sapien Cyber Who is responsible for cyber security in your organization? Smart businesses […] The post The Role of The CFO In Enterprise Cyber Security appeared…
The Safest Ways for Bitcoin Trading
This article has been indexed from Cyber Defense Magazine By Robert Wilson, Freelancer During the year 2021, we experienced history in the cryptocurrency niche with the 3rd […] The post The Safest Ways for Bitcoin Trading appeared first on Cyber…
Why Changing Classified Document Status Can Affect Risk Levels and How Proactive Cybersecurity Methods Can Help
This article has been indexed from Cyber Defense Magazine By Sam Hutton, SVP, Glasswall As ransomware attacks, insider threats, data breaches and phishing attacks against government agencies […] The post Why Changing Classified Document Status Can Affect Risk Levels and…
The Fragility of a GPS Centric World and the Importance of eLORAN
This article has been indexed from Cyber Defense Magazine By Dan Dickey, President, Continental Electronics Corporation Both the importance of GPS systems and their vulnerability to a […] The post The Fragility of a GPS Centric World and the Importance…
Data Security Must Be a Priority as Employees Quit in Record Numbers
This article has been indexed from Cyber Defense Magazine By Tim Sadler, Co-founder and CEO, Tessian The massive labor upheaval that dominated headlines in 2021 shows no […] The post Data Security Must Be a Priority as Employees Quit in…
Why Building Managers Need to Prioritize Cybersecurity
This article has been indexed from Cyber Defense Magazine By Shaun Cooley, Founder and CEO of Mapped In an age increasingly dominated by the internet of Things […] The post Why Building Managers Need to Prioritize Cybersecurity appeared first on…
Cyber Insurance: What Executives Need to Know Before Obtaining Coverage
This article has been indexed from Cyber Defense Magazine By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue […] The post Cyber Insurance: What Executives Need to Know Before Obtaining Coverage…
Detect Ransomware Data Exfiltration Immediately
This article has been indexed from Cyber Defense Magazine By Randy Reiter CEO of Don’t Be Breached Ransomeware Attacks Have Increased During the COVID-19 Pandemic An off-site […] The post Detect Ransomware Data Exfiltration Immediately appeared first on Cyber Defense…
Understanding Identity Detection and Response
This article has been indexed from Cyber Defense Magazine Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related […] The post Understanding Identity Detection and Response appeared first on Cyber Defense…
Combining True MDR & SOC for Robust Cybersecurity
This article has been indexed from Cyber Defense Magazine By Jon Murchison, Founder, and CEO, Blackpoint Cyber Assessing the Current Threat Landscape The only constant in the […] The post Combining True MDR & SOC for Robust Cybersecurity appeared first…
The Cybersecurity Trends You Need to Know About In 2022
This article has been indexed from Cyber Defense Magazine By Jamie Wilson, MD & Founder, Cryptoloc Technology Group In 2021, no sector of the Australian economy was […] The post The Cybersecurity Trends You Need to Know About In 2022…
Killware is the Next Big Cybersecurity Threat
This article has been indexed from Cyber Defense Magazine By Brian Erickson, Vice President or Strategy and Solutions and retired U.S. Navy Captain, Vidoori Today’s battlefield has […] The post Killware is the Next Big Cybersecurity Threat appeared first on…
Why Ransomware is Only a Symptom of a Larger Problem
This article has been indexed from Cyber Defense Magazine While ransomware is arguably the greatest current security threat to organizations, its rise has distracted us from the […] The post Why Ransomware is Only a Symptom of a Larger Problem…
Responding To the Ransomware Pandemic
This article has been indexed from Cyber Defense Magazine By Tom McVey, Solution Architect, Menlo Security Last year, Kaseya became the victim of the largest ransomware attack […] The post Responding To the Ransomware Pandemic appeared first on Cyber Defense…
Today’s Digital Battlefield Demands Resilience Beyond Infrastructure
This article has been indexed from Cyber Defense Magazine By Mohammed Al Mohtadi, Cyber Information Security Officer, Injazat There is a battle underway globally that requires every […] The post Today’s Digital Battlefield Demands Resilience Beyond Infrastructure appeared first on…
5 Ways to Protect Your Workplace from Cybersecurity Threats
This article has been indexed from Cyber Defense Magazine The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving the ability for cyber criminals and […] The post 5 Ways to Protect Your Workplace from Cybersecurity Threats appeared…
Mitigating Risk from Insider Threats in 2022
This article has been indexed from Cyber Defense Magazine By Isaac Kohen, Teramind Back in August 2020, a story of an insider threat caught headlines when the […] The post Mitigating Risk from Insider Threats in 2022 appeared first on…
Web Application Penetration Testing Checklist with OWASP Top 10
This article has been indexed from Cyber Defense Magazine We’ve gone ahead and compiled this article to shed some light on the top ten web application security […] The post Web Application Penetration Testing Checklist with OWASP Top 10 appeared…
Decision Trees in Case of a Ransomware Attack
This article has been indexed from Cyber Defense Magazine Does Your Organization Have a Procedure to Handle a Ransomware? Is It Worth Paying the Attackers? By Zsolt […] The post Decision Trees in Case of a Ransomware Attack appeared first…
How To Improve Federal Endpoint Detection and Response Tactics and Gain Network Visibility
This article has been indexed from Cyber Defense Magazine By Matt Marsden, Vice President, Technical Account Management, Federal, Tanium Endpoint detection and response (EDR) was put on […] The post How To Improve Federal Endpoint Detection and Response Tactics and…
Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure
This article has been indexed from Cyber Defense Magazine By Tomasz Kowalski, CEO, Secfense According to a Trustwave report, medical data may cost up to $250 per […] The post Cybercriminals Hunt For Medical Data. Zero Trust As The Only…
How Do I Reliably Identify You If I Cannot See You?
This article has been indexed from Cyber Defense Magazine eKnow Your Customer Requirements Driving Change By John Callahan, CTO, VeridiumID KYC – Know Your Customer is a […] The post How Do I Reliably Identify You If I Cannot See…
Cyber Defense Media Group Launches CyberDefenseCon 2022
This article has been indexed from Cyber Defense Magazine On the heels of its 10th anniversary, Cyber Defense Media Group announces the exclusive Cyber Defense Conference for […] The post Cyber Defense Media Group Launches CyberDefenseCon 2022 appeared first on…
The Top 5 Cloud Security Predictions for 2022
This article has been indexed from Cyber Defense Magazine New threats, new apps, new players – but data plays the biggest role in shaping the future. By […] The post The Top 5 Cloud Security Predictions for 2022 appeared first…
Understanding Identity Detection and Response
This article has been indexed from Cyber Defense Magazine Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related […] The post Understanding Identity Detection and Response appeared first on Cyber Defense…
How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks
This article has been indexed from Cyber Defense Magazine By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder […] The post How Criminals Have Migrated Through Identity Theft and Privacy into…
Cyber Defense Media Group – 10 Year Anniversary – Daily Celebration in 2022
This article has been indexed from Cyber Defense Magazine IT’S A BIG, BOLD, BEAUTIFUL 2022 – OUR 10TH ANNIVERSARY We’re celebrating this milestone every day this year […] The post Cyber Defense Media Group – 10 Year Anniversary – Daily…