Tag: Cyber Defense Magazine

Sweatpants & Cyberthreats: Managing Remote Employee Risk

The remote work revolution did not just change where we work, it redefined how we secure our workplaces. The shift, which was accelerated by the pandemic, has forced organizations to… The post Sweatpants & Cyberthreats: Managing Remote Employee Risk appeared…

Your Alerts Are Increasing Your Cybersecurity Risk

At their core, alerts exist to bring attention to something meaningful: an indicator of compromise (IOC), an indicator of attack (IOA), or a suspicious behavior worth investigating. But in any… The post Your Alerts Are Increasing Your Cybersecurity Risk appeared…

Is Hacking Back Ever a Good Strategy?

Hacking back aims to retaliate against cyberattackers by launching a counterattack to disrupt their systems, recover stolen data or send a message. As cyberthreats grow more frequent and sophisticated, it’s… The post Is Hacking Back Ever a Good Strategy? appeared…

What Security Teams Are Looking for in Identity Management Today

Identity management gives organizations better visibility and control over their identity infrastructure – if they use the right approach. Well regarded cybersecurity thought-leader, Francis Odum recently noted that a company’s identity posture… The post What Security Teams Are Looking for in Identity…

Innovator Spotlight: Singulr AI

The AI Governance Tightrope: Enabling Innovation Without Compromising Security  Cybersecurity leaders are facing a critical inflection point. The rapid emergence of artificial intelligence technologies presents both unprecedented opportunities and significant… The post Innovator Spotlight: Singulr AI appeared first on Cyber…