Category: Cyber Defense Magazine

The Future of MFA

This article has been indexed from Cyber Defense Magazine Going Beyond Privileged Accounts By François Amigorena, Founder & CEO, IS Decisions Given the current global cyber threat […] The post The Future of MFA appeared first on Cyber Defense Magazine.…

Drones And the Battlefield

This article has been indexed from Cyber Defense Magazine How Drones Are Transforming Military Operations By Dr. Shaun Passley, Founder, ZenaDrone Recent years have seen a substantial […] The post Drones And the Battlefield appeared first on Cyber Defense Magazine.…

Ethical AI – How is AI Redefining the Insurance Industry?

This article has been indexed from Cyber Defense Magazine By Antoine de Langlois, Responsible AI Data Scientist at Zelros When Cybersecurity meets Artificial Intelligence, companies and organizations […] The post Ethical AI – How is AI Redefining the Insurance Industry?…

Cybersecurity’s New Frontier: Space

This article has been indexed from Cyber Defense Magazine By Duncan Jones, Head of Cybersecurity, Quantinuum Ground-to-space communication is not an area that immediately comes to mind […] The post Cybersecurity’s New Frontier: Space appeared first on Cyber Defense Magazine.…

Preventing Ransomware Attacks On Industrial Networks

This article has been indexed from Cyber Defense Magazine By Michael Yehoshua, VP Marketing, SCADAfence Ransomware Works That’s the simplest way to explain why incidents of ransomware […] The post Preventing Ransomware Attacks On Industrial Networks appeared first on Cyber…

Data-centric Security: Defense in Depth

This article has been indexed from Cyber Defense Magazine By Amit Shaked, CEO, Laminar Last year, organizations saw the highest average cost of a data breach in […] The post Data-centric Security: Defense in Depth appeared first on Cyber Defense…

How To Establish SAP Security

This article has been indexed from Cyber Defense Magazine By Christoph Nagy, CEO, SecurityBridge Malicious external cyber-threats certainly grab the headlines and leave businesses with no doubt […] The post How To Establish SAP Security appeared first on Cyber Defense…

Preventing Ransomware Attacks On Industrial Networks

This article has been indexed from Cyber Defense Magazine By Michael Yehoshua, VP Marketing, SCADAfence Ransomware Works That’s the simplest way to explain why incidents of ransomware […] The post Preventing Ransomware Attacks On Industrial Networks appeared first on Cyber…

The Countdown Has Started on Secure IoT Compliance

This article has been indexed from Cyber Defense Magazine By Kyle Haefner, Lead Security Architect, CableLabs, Bruno Johnson, CEO, Cascoda, Joe Lomako, Cybersecurity Lead, TÜV SÜD UK […] The post The Countdown Has Started on Secure IoT Compliance appeared first…

Tips for Implementing HITRUST for Healthcare Providers

This article has been indexed from Cyber Defense Magazine By Philip Jones, Mazars, Director of Security – Chief Information Security Officer (CISO), Data Privacy Officer (DPO) for […] The post Tips for Implementing HITRUST for Healthcare Providers appeared first on…

5 Key Learnings from Intel’s 2021 Product Security Report

This article has been indexed from Cyber Defense Magazine By Jerry Bryant, Senior Director of Security Communications and Incident Response at Intel As security threats continue to […] The post 5 Key Learnings from Intel’s 2021 Product Security Report appeared…

Why Do You Need a Malware Sandbox?

This article has been indexed from Cyber Defense Magazine By ANY.RUN Team To solve the problem of identifying previously unknown malware samples help malware sandboxes – protection […] The post Why Do You Need a Malware Sandbox? appeared first on…

3 Best Practices to Avoid Inevitable Ransomware Attacks

This article has been indexed from Cyber Defense Magazine Tips to mitigate and protect against the ongoing threats of ransomware By Jesper Zerlang, CEO, LogPoint The total […] The post 3 Best Practices to Avoid Inevitable Ransomware Attacks appeared first…

The Benefits of Hyperautomation

This article has been indexed from Cyber Defense Magazine By Nathan Hull, Principal Solutions Architect, Technologent Hyperautomation – in short, is the process of automating business automation. […] The post The Benefits of Hyperautomation appeared first on Cyber Defense Magazine.…

Why MFA Alone Isn’t Enough for True Cybersecurity

This article has been indexed from Cyber Defense Magazine By Bojan Simic, Co-Founder, Interim CEO & CTO, HYPR Multi-factor authentication (MFA) was once a foreign terminology, but […] The post Why MFA Alone Isn’t Enough for True Cybersecurity appeared first…

How Covid-19 Changed Advertising Forever

This article has been indexed from Cyber Defense Magazine By Bernie Brode, product researcher at Microscopic Machines There has been much written about how the Covid-19 pandemic […] The post How Covid-19 Changed Advertising Forever appeared first on Cyber Defense…

Darkweb Monitoring

This article has been indexed from Cyber Defense Magazine An Indispensable Element of Cyber Risk Management Strategy By Kaustubh Medhe, Head of Research and Intelligence, Cyble As […] The post Darkweb Monitoring appeared first on Cyber Defense Magazine. Read the…

9 Ways Social Media Sabotages Your Cybersecurity

This article has been indexed from Cyber Defense Magazine By Alex Lysak, CEO of Scanteam Social media has become one of the most common ways to spend […] The post 9 Ways Social Media Sabotages Your Cybersecurity appeared first on…

Cybersecurity and Other Top Risk Factors in 2022

This article has been indexed from Cyber Defense Magazine By Dan Zitting, Chief Product & Strategy Officer at Diligent As we pass the second anniversary of the […] The post Cybersecurity and Other Top Risk Factors in 2022 appeared first…

The Security Vulnerabilities Facing Remote Workforces

This article has been indexed from Cyber Defense Magazine An organization’s security is only as good as its weakest link By Daniel Hofmann, CEO, Hornetsecurity With work […] The post The Security Vulnerabilities Facing Remote Workforces appeared first on Cyber…

The Quantum Tipping Point

This article has been indexed from Cyber Defense Magazine Fixing Cryptography Before It Is Broken By Carmen Kempka, Head of Corporate Technology, WIBU-SYSTEMS AG Ever since Peter […] The post The Quantum Tipping Point appeared first on Cyber Defense Magazine.…

4 Ways to Improve Azure Active Directory Security

This article has been indexed from Cyber Defense Magazine Why identity has emerged as the security perimeter in hybrid deployments By Guido Grillenmeier, Chief Technologist at Semperis […] The post 4 Ways to Improve Azure Active Directory Security appeared first…

Fighting The International Cyber War with Ai

This article has been indexed from Cyber Defense Magazine As Ukraine fights to maintain a stronghold on its besieged capital, cyberattacks are escalating. Governments on both sides […] The post Fighting The International Cyber War with Ai appeared first on…

Three Ways IP Data Enhances Cyber Security

This article has been indexed from Cyber Defense Magazine By Jonathan Tomek, VP of Research and Development, Digital Envoy Cyber security professionals were never worry-free; there are […] The post Three Ways IP Data Enhances Cyber Security appeared first on…

Too Hot to Handle:The case for Zero Trust and SASE

This article has been indexed from Cyber Defense Magazine By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance on legacy […] The post Too Hot to Handle:The case for Zero Trust and SASE…

Redefining Resilience in The New World of Work

This article has been indexed from Cyber Defense Magazine By Andrew Lawton, CEO of Reskube Ltd We are entering a new world of work. The Covid-19 pandemic […] The post Redefining Resilience in The New World of Work appeared first…

5 Ways Cybersecurity Will Change In 2022

This article has been indexed from Cyber Defense Magazine By Jaime Coreano, Vice President of Sales – Flexxon The annual cost of cybercrime is set to hit […] The post 5 Ways Cybersecurity Will Change In 2022 appeared first on…

Biggest Cyber Trend in 2022

This article has been indexed from Cyber Defense Magazine You Can’t Fix Stupid By Guy Rosefelt, CPO, Sangfor Technologies Stop me if you have heard this one: […] The post Biggest Cyber Trend in 2022 appeared first on Cyber Defense…

On The Frontline in The War Against Hackers

This article has been indexed from Cyber Defense Magazine By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift toward remote […] The post On The Frontline in The War Against Hackers appeared first…

How To Defend Railway Subsystems from Targeted Cyber-Attacks

This article has been indexed from Cyber Defense Magazine By Michael Cheng, Director at TXOne Networks & C. Max. Farrell, Senior Technical Marketing Specialist at TXOne Networks […] The post How To Defend Railway Subsystems from Targeted Cyber-Attacks appeared first…

Top 10 Reasons Cyber Defense Firms Should Hire Veterans

This article has been indexed from Cyber Defense Magazine Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring to […] The post Top 10 Reasons Cyber Defense Firms Should Hire Veterans appeared…

3 Cybersecurity Certainties for 2022

This article has been indexed from Cyber Defense Magazine By Bill Moore, XONA As businesses transitioned to hybrid work models in 2021, critical integrations between IT and […] The post 3 Cybersecurity Certainties for 2022 appeared first on Cyber Defense…

How to strengthen cyber resilience with Unified BCDR

This article has been indexed from Cyber Defense Magazine By Joe Noonan, General Manager, Unitrends and Spanning Cybercrime and hybrid work environments prompted by the pandemic have […] The post How to strengthen cyber resilience with Unified BCDR appeared first…

The 7 Top Cybersecurity Conferences for 2022

This article has been indexed from Cyber Defense Magazine While there are many more cybersecurity tradeshows events and gatherings these are my seven favorite for 2022 in […] The post The 7 Top Cybersecurity Conferences for 2022 appeared first on…

Ransomware — Encrypt Your Data Before Others Do

This article has been indexed from Cyber Defense Magazine Don’t let them look at your data. By Robert Freudenreich, CTO and Founder, Secomba GmbH | Boxcryptor A […] The post Ransomware — Encrypt Your Data Before Others Do appeared first…

The Role of The CFO In Enterprise Cyber Security

This article has been indexed from Cyber Defense Magazine By Glenn Murray, CEO at Sapien Cyber Who is responsible for cyber security in your organization? Smart businesses […] The post The Role of The CFO In Enterprise Cyber Security appeared…

The Safest Ways for Bitcoin Trading

This article has been indexed from Cyber Defense Magazine By Robert Wilson, Freelancer During the year 2021, we experienced history in the cryptocurrency niche with the 3rd […] The post The Safest Ways for Bitcoin Trading appeared first on Cyber…

Why Building Managers Need to Prioritize Cybersecurity

This article has been indexed from Cyber Defense Magazine By Shaun Cooley, Founder and CEO of Mapped In an age increasingly dominated by the internet of Things […] The post Why Building Managers Need to Prioritize Cybersecurity appeared first on…

Detect Ransomware Data Exfiltration Immediately

This article has been indexed from Cyber Defense Magazine By Randy Reiter CEO of Don’t Be Breached Ransomeware Attacks Have Increased During the COVID-19 Pandemic An off-site […] The post Detect Ransomware Data Exfiltration Immediately appeared first on Cyber Defense…

Understanding Identity Detection and Response

This article has been indexed from Cyber Defense Magazine Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related […] The post Understanding Identity Detection and Response appeared first on Cyber Defense…

Combining True MDR & SOC for Robust Cybersecurity

This article has been indexed from Cyber Defense Magazine By Jon Murchison, Founder, and CEO, Blackpoint Cyber Assessing the Current Threat Landscape The only constant in the […] The post Combining True MDR & SOC for Robust Cybersecurity appeared first…

Killware is the Next Big Cybersecurity Threat

This article has been indexed from Cyber Defense Magazine By Brian Erickson, Vice President or Strategy and Solutions and retired U.S. Navy Captain, Vidoori Today’s battlefield has […] The post Killware is the Next Big Cybersecurity Threat appeared first on…

Why Ransomware is Only a Symptom of a Larger Problem

This article has been indexed from Cyber Defense Magazine While ransomware is arguably the greatest current security threat to organizations, its rise has distracted us from the […] The post Why Ransomware is Only a Symptom of a Larger Problem…

Responding To the Ransomware Pandemic

This article has been indexed from Cyber Defense Magazine By Tom McVey, Solution Architect, Menlo Security Last year, Kaseya became the victim of the largest ransomware attack […] The post Responding To the Ransomware Pandemic appeared first on Cyber Defense…

5 Ways to Protect Your Workplace from Cybersecurity Threats

This article has been indexed from Cyber Defense Magazine The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving the ability for cyber criminals and […] The post 5 Ways to Protect Your Workplace from Cybersecurity Threats appeared…

Mitigating Risk from Insider Threats in 2022

This article has been indexed from Cyber Defense Magazine By Isaac Kohen, Teramind Back in August 2020, a story of an insider threat caught headlines when the […] The post Mitigating Risk from Insider Threats in 2022 appeared first on…

Decision Trees in Case of a Ransomware Attack

This article has been indexed from Cyber Defense Magazine Does Your Organization Have a Procedure to Handle a Ransomware? Is It Worth Paying the Attackers? By Zsolt […] The post Decision Trees in Case of a Ransomware Attack appeared first…

How Do I Reliably Identify You If I Cannot See You?

This article has been indexed from Cyber Defense Magazine eKnow Your Customer Requirements Driving Change By John Callahan, CTO, VeridiumID KYC – Know Your Customer is a […] The post How Do I Reliably Identify You If I Cannot See…

Cyber Defense Media Group Launches CyberDefenseCon 2022

This article has been indexed from Cyber Defense Magazine On the heels of its 10th anniversary, Cyber Defense Media Group announces the exclusive Cyber Defense Conference for […] The post Cyber Defense Media Group Launches CyberDefenseCon 2022 appeared first on…

The Top 5 Cloud Security Predictions for 2022

This article has been indexed from Cyber Defense Magazine New threats, new apps, new players – but data plays the biggest role in shaping the future. By […] The post The Top 5 Cloud Security Predictions for 2022 appeared first…

Understanding Identity Detection and Response

This article has been indexed from Cyber Defense Magazine Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related […] The post Understanding Identity Detection and Response appeared first on Cyber Defense…