Tag: Cyber Defense Magazine

Connecting Tech to Black America

By David Lee, Chief Evangelist and Visionary for Tech Diversity As technology rapidly evolves and advances, it can often seem inaccessible and intimidating for the everyday person. For Black Americans […] The post Connecting Tech to Black America appeared first…

The Importance of Cyber Hygiene for Businesses

By Rigo Van den Broeck, Executive Vice President, Cyber Security Product Innovation at Mastercard Cybercrime is set to cost $10.3 trillion worldwide by 2025, and it’s growing fast. It’s a […] The post The Importance of Cyber Hygiene for Businesses…

5 Cybersecurity Resolutions for the New Year

By Roger Spears, Schneider Downs Whenever the new year rolls around, resolutions—to achieve a goal, improve a behavior or continue good practices—abound. And, while many resolutions center personal goals such […] The post 5 Cybersecurity Resolutions for the New Year…

Adapting to the Deluge of Cybersecurity Data

By Charlie Thomas, CEO, Deepwatch The ever-increasing volume of security data is becoming unmanageable through conventional data analysis, security tools and management techniques. Security teams are deluged with logs, events, […] The post Adapting to the Deluge of Cybersecurity Data…

When Security Collides with Customer Impatience

How Biographic and Biometric Information Work as a Team to Solve the Problem By Raj Ananthanpillai, CEO, Trua Online customers don’t take long to get fidgety. They want their transactions […] The post When Security Collides with Customer Impatience appeared…

DevSecOps Practices for a Secure Cloud

How to start ahead of the curve? By Vishakha Sadhwani, Customer Engineer, Google Cloud In today’s rapidly evolving technological landscape, a strong cultural practice like DevSecOps is essential. It empowers […] The post DevSecOps Practices for a Secure Cloud appeared…

Vendors Beware of the Cybersecurity Audit

By Caroline McCaffery, Co-Founder and CEO of ClearOPS Introduction to Vendor Management Why does every license agreement and data protection addendum, suddenly, include a right for the buyer to perform […] The post Vendors Beware of the Cybersecurity Audit appeared…

Three Key Threats Fueling the Future of Cyber Attacks

By Rishi Baviskar, Global Head of Cyber Risk Consulting at Allianz Commercial Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat […] The post Three Key Threats Fueling the Future of…

The Quantum Shift

Preparing Cybersecurity for a New Era By Sercan Okur, VP of Technology, NextRay In contrast to my previous pieces, I intend to commence this piece with a hypothetical calamitous situation. […] The post The Quantum Shift appeared first on Cyber…

CISO Life: the Good, the Bad, the Ugly

What type of things can go wrong with Senior Leadership, the Org, Legal, HR, etc. by Dan K. Anderson In today’s hectic Cyber world, the role of CISO continues to […] The post CISO Life: the Good, the Bad, the…

Government Communications: The Threats

By Nicole Allen, Marketing Manager at Salt Communications In an age where information flows freely and rapidly, government communications have never been more vulnerable. The digital age has ushered in […] The post Government Communications: The Threats appeared first on…

SASE and Zero Trust: A Powerful Combination

By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Gone are the days when network security resembled a medieval castle. It was protected by a robust drawbridge and moat. In our […] The post SASE and Zero Trust: A Powerful Combination…

A 5-Minute Refresher to Cryptography

 (featuring Alice and Bob) by Rajvi Shroff It’s an age-old question. Alice wants to send a message to Bob. But how can Alice send it to Bob without Eve, the […] The post A 5-Minute Refresher to Cryptography appeared first…

Bridging IT and OT Cybersecurity with AI

Reduce Alerts by 57% with Difenda AIRO By Andrew Hodges, VP Service Delivery & Product Development, Difenda In a technology-driven world, where even the most everyday devices are connected to […] The post Bridging IT and OT Cybersecurity with AI…

Accelerate the path to PCI DSS 4.0 adoption

By Héctor Guillermo Martínez, President of GM Sectec With the release of a new version of the PCI DSS 4.0 Payment Card Industry Data Security Standard, the safety and security […] The post Accelerate the path to PCI DSS 4.0…

Passwords In the Air

By Gautam Hazari, Chief Technology Officer, Sekura.id Imagine, you are sitting in a café, sipping the skillfully crafted coffee by the barista, with your laptop placed on the table in […] The post Passwords In the Air appeared first on…

Key Differences in Securing OT & IT Environments

Critical cybersecurity components every security leader must know amid the convergence of IT & OT By Joe O’Donnell, EVP of Corporate Development, Cyolo The increasing cyberattacks against critical sectors, in […] The post Key Differences in Securing OT & IT…

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…

Implementing ZTA: Benefits and Best Practices

By Eric Sugar, President, ProServeIT In an era defined by the relentless advance of digitalization and the ever-expanding interconnectivity of industrial systems, the realm of cybersecurity has been thrust into […] The post Implementing ZTA: Benefits and Best Practices appeared…

Enhancing The Nation’s Cybersecurity Workforce

Supporting Critical Infrastructure Resilience with Skill-Based Labor By Randall Sandone, Executive Director, Critical Infrastructure Resilience Institute at The Grainger College of Engineering at the University of Illinois Urbana-Champaign “With almost […] The post Enhancing The Nation’s Cybersecurity Workforce appeared first…

Does Zero Trust Improve Productivity?

By Zac Amos, Features Editor, ReHack Zero trust has gained significant attention as an effective approach to secure digital assets. It’s a security framework that’s also believed to impact employee […] The post Does Zero Trust Improve Productivity? appeared first…

Cybersecurity Threats in Global Satellite Internet

By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the […] The post Cybersecurity Threats in Global Satellite Internet appeared…

Classic Information Security Management Errors

How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as an information security expert, I encounter numerous errors, many of […] The post Classic Information Security Management Errors appeared first…

Prioritizing Action After the Threat Headlines

By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially cybersecurity professionals, know the feeling. Minutes – sometimes seconds – […] The post Prioritizing Action After the Threat Headlines appeared…

Deepfakes and AI’s New Threat to Security

The high cost of free open-source generative software. By Luke Arrigoni, Founder, Loti The rise of deepfake technology poses significant risks to celebrities, high-net-worth individuals, and the general public, with […] The post Deepfakes and AI’s New Threat to Security…

Addressing Bias in Insider Risk Monitoring

By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […] The post Addressing Bias in Insider Risk Monitoring appeared…

ImmuniWeb AI Platform

Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […] The post ImmuniWeb AI Platform appeared first on Cyber…

Safeguarding the Code That Drives Modern Vehicles

By Soujanya Ain is a Product Marketing Manager at GitGuardian The automotive landscape has evolved dramatically, from mechanical marvels to sophisticated platforms on wheels driven by intricate computer systems. Surprisingly, […] The post Safeguarding the Code That Drives Modern Vehicles…

SIEM vs XDR: Capabilities and Key Differences

We compare the differences in SIEM and XDR’s respective contributions to security By Aimei Wei, Chief Technical Officer and Founder, Stellar Cyber All enterprises comprise vast webs of interconnected devices. […] The post SIEM vs XDR: Capabilities and Key Differences…

Generative Ai: The Future of Cloud Security

By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation Generative AI: The Future of Cloud Security As the digital landscape undergoes a relentless […] The post Generative Ai: The Future of Cloud Security…

What You Need to Know About the Cybersecurity Market in 2024

By Doug Saylors, Partner, Co-lead, Cybersecurity, Information Services Group (ISG) The cybersecurity market offers promising opportunities for real-time threat intelligence through advanced technologies such as AI and ML. It’s also […] The post What You Need to Know About the…

Safeguarding Children in the Era of Big Data

By Ron Kerbs, CEO, Kidas In the ever-evolving landscape of cyberspace, 2023 unveiled a concerning trend: major players in the tech industry, including giants like Meta and Discord, were found […] The post Safeguarding Children in the Era of Big…

Securing Space Infrastructure for US And Allied Collaboration

By Kevin Kelly, CEO and Chairman, Arcfield As the role of satellite communication systems in geopolitical conflicts and critical infrastructure sectors continues to expand, concern regarding the security of satellite […] The post Securing Space Infrastructure for US And Allied…

Ransom-War Escalation: The New Frontline in Cyber Warfare

By Nissim Ben Saadon, Director of Innovation, CYREBRO High-profile ransomware attacks against government targets in Costa Rica and Peru last year brought a new twist to the concept of cyberwar: […] The post Ransom-War Escalation: The New Frontline in Cyber…

Hyperautomation: Revolutionizing the Security Market

By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) Hyperautomation: Revolutionizing the Security Market In today’s digital age, the security landscape is constantly […] The post Hyperautomation: Revolutionizing the Security Market appeared first…

How Businesses Can Manage Cryptocurrency Fraud

With cryptocurrency payments on the rise, businesses must learn how to safeguard against potential risks. By James Hunt, Subject Matter Expert Payments, Feedzai Businesses across the US are seeking innovative […] The post How Businesses Can Manage Cryptocurrency Fraud appeared…

Cyber Resilience – Beyond Cyber Security

In a world where 100% security is not possible, we need to be resilient as we strive to be secure. By James Gorman, Hard2hack.com The evolving landscape of cyber threats […] The post Cyber Resilience – Beyond Cyber Security appeared…

An Interview With Jeffrey Stephens

🔒 Dive into the electrifying world of cyber espionage and the ghost chip with Jeffrey S. Stephens on @CyberDefenseTV! 💻 Unravel the gripping tale of Nick Reagan’s pursuit of “Enemies […] The post An Interview With Jeffrey Stephens appeared first…

Cybersecurity Preparedness 2024

By Chris Leach, Board Advisor for Judy Security The new year is just around the corner.  We have had a great Thanksgiving meal and soon our thoughts will turn to […] The post Cybersecurity Preparedness 2024 appeared first on Cyber…

Evolution and Escalation of Cybersecurity Threats

The Darwinian Effect in the Threat Community By Augusto Barros, Vice President Cyber Security Evangelist at Securonix Among the typical predictions for the upcoming new year, we often see something […] The post Evolution and Escalation of Cybersecurity Threats appeared…

Reshaping the Focus of Cybersecurity

Key Insights from the International Counter Ransomware Initiative Statement By Todd Thorsen, Chief Information Security Officer, CrashPlan Earlier in November, media outlets widely reported the contents of a remarkable joint […] The post Reshaping the Focus of Cybersecurity appeared first…

MGM & Caesars Cyberattacks: Lessons Learned

By Tim Callan, Chief Experience Officer, Sectigo In the aftermath of the MGM and Caesars cyberattacks, many IT professionals are probably asking themselves, am I next? What lessons can businesses […] The post MGM & Caesars Cyberattacks: Lessons Learned appeared…