How Artificial Intelligence is transforming both cyber defense and cybercrime by Venkatesh Apsingekar, Senior Engineering Manager – Illumio I recently watched Terminator 2 with my 9-year-old son. Since It was… The post AI vs AI: The Future of Cybersecurity Is…
Tag: Cyber Defense Magazine
Your Alerts Are Increasing Your Cybersecurity Risk
At their core, alerts exist to bring attention to something meaningful: an indicator of compromise (IOC), an indicator of attack (IOA), or a suspicious behavior worth investigating. But in any… The post Your Alerts Are Increasing Your Cybersecurity Risk appeared…
Is Hacking Back Ever a Good Strategy?
Hacking back aims to retaliate against cyberattackers by launching a counterattack to disrupt their systems, recover stolen data or send a message. As cyberthreats grow more frequent and sophisticated, it’s… The post Is Hacking Back Ever a Good Strategy? appeared…
Is CMMC 3.0 on the Horizon? How Defense Contractors Can Prepare Now
The Department of Defense recently sent defense contractors a clear signal: an update to the recently finalized CMMC 2.0 is likely coming and the time to prepare is now. In… The post Is CMMC 3.0 on the Horizon? How Defense…
In Defense of Good Bots: Good Bots Exist, But Only When We Build Them That Way
The word “bot” doesn’t have the best reputation right now. You hear it and think of election manipulation, fake social media accounts, scammy customer service chatbots, or malware scanning networks…. The post In Defense of Good Bots: Good Bots Exist,…
Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM)
In today’s cybersecurity landscape, identity is no longer just a credentialing concern; it is the battleground. Modern cyber defenses increasingly need to be identity-centric. With attackers increasingly bypassing traditional defenses… The post Identity Risk Intelligence – The Missing Piece in…
How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics
Cyberattacks are becoming increasingly complex because organizations are more interconnected than ever before while threat actors are better resourced and digital environments are harder to defend. The ability to prevent… The post How Chief Technology Officers Can Stay Ahead of…
Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies
The emergence of AI represents a workplace revolution, transforming virtually every industry and reshaping the daily experiences and responsibilities of employees. However, like all new technologies, it carries risks. One… The post Data Loss, Monetary Damage, and Reputational Harm: How…
Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025
There has been an increase in the advent of cyberattacks like never before. The companies are adopting cloud computing, AI-driven tech solutions and IoT technologies, intensifying the chances of data… The post Cybersecurity Is Now a Regulatory Minefield: What CISOs…
Security in AI Era: Protecting AI Workloads with Google Cloud
Network Infrastructure & Security are the foundation any day even in the AI era. The evolution of artificial intelligence, along with large language models and generative AI, has made it… The post Security in AI Era: Protecting AI Workloads with…
How Can IT Security Professionals Best Navigate the CMMC Maze?
For companies still treating the Cybersecurity Maturity Model Certification (CMMC) as an IT-only concern, the risks are growing. Developed by the U.S. Department of Defense (DoD), CMMC is a comprehensive… The post How Can IT Security Professionals Best Navigate the…
What Security Teams Are Looking for in Identity Management Today
Identity management gives organizations better visibility and control over their identity infrastructure – if they use the right approach. Well regarded cybersecurity thought-leader, Francis Odum recently noted that a company’s identity posture… The post What Security Teams Are Looking for in Identity…
Innovator Spotlight: Singulr AI
The AI Governance Tightrope: Enabling Innovation Without Compromising Security Cybersecurity leaders are facing a critical inflection point. The rapid emergence of artificial intelligence technologies presents both unprecedented opportunities and significant… The post Innovator Spotlight: Singulr AI appeared first on Cyber…
AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense
Quick Summary: AI agents enable security teams to surge ahead of the most advanced threats using automated decision-making, real time response, and intelligent prioritization of threats on SOC and infrastructure. The cyber… The post AI on the Frontlines: How Agentic AI is…
Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing
In today’s interconnected digital landscape, businesses are more dependent than ever on third-party vendors and partners. While these relationships bring numerous benefits, they also introduce significant risks. Traditional third-party risk… The post Revolutionizing Third Party Risk Management: The Future with…
The Digital Campus Challenge: Why Universities Need to Reassess Cyber Risks
In February 2024, several British universities were hit by a major DDoS attack. In the past, a disruption to connectivity would mostly have been a problem for the university itself, but… The post The Digital Campus Challenge: Why Universities Need to…
Rethinking NHI Security: The Essential Shift to Zero Trust Security and Ephemeral Identities
As identity security becomes increasingly critical in cybersecurity, the focus has shifted from safeguarding human identities to protecting Non-Human Identities (NHIs)—such as API keys, service accounts, secrets, tokens, and certificates. While… The post Rethinking NHI Security: The Essential Shift to Zero…
Navigating Complexity: CISO Strategies for Security Tool Consolidation and Budget Optimization
In the dynamic landscape of modern cybersecurity, Chief Information Security Officers (CISOs) often face a paradoxical challenge: the proliferation of security tools. While each solution promises to strengthen defenses, the… The post Navigating Complexity: CISO Strategies for Security Tool Consolidation…
Navigating Holiday Threats: Strengthening PC Resilience with Desktops as a Service (DaaS)
The holiday season, often seen as a time for joy and celebration, has transformed into a crucial period for organizational cybersecurity. With online activity surging and remote work becoming the… The post Navigating Holiday Threats: Strengthening PC Resilience with Desktops…
Achieving Crypto Agility Through eFPGA: A Prerequisite for Secure ASIC and SoC Designs
In an era where digital threats evolve daily and quantum computing looms on the horizon, the need for true crypto agility has never been more urgent. From increasingly advanced AI… The post Achieving Crypto Agility Through eFPGA: A Prerequisite for…