Tag: Cyber Defense Magazine

The Industrial Control Systems and The Internet of Things

By Milica D. Djekic The industrial control systems (ICS) are usually the part of critical infrastructure to every country or nation. These systems have passed through information era and today […] The post The Industrial Control Systems and The Internet…

Publisher’s Spotlight: Cigent: Make Your Data Invisible

Cigent Technologies is a data security company that is renowned for their data protection  capabilities. They’ve had a long-standing relationship with the U.S. government and have been a trusted resource […] The post Publisher’s Spotlight: Cigent: Make Your Data Invisible…

SaaS Application Security: Why It Matters and How to Get It Right

Protecting Emerging Startups from Advanced Cyber Threats with Proactive Security Measures By Babar Khan Akhunzada, Founder, SecurityWall Startups are known for their agility, speed, and innovation. They often disrupt entire […] The post SaaS Application Security: Why It Matters and…

Our Risk Perception Is Broken How Do We Fix It?

By Miguel Clarke, GRC and Cybersecurity Lead at Armor and former FBI Special Agent I was first introduced to the concept of cyber security in 2000.  Back then, the Dallas […] The post Our Risk Perception Is Broken How Do…

Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries

Oligo Security is one of the leading open source cybersecurity platforms, pioneering the next wave of application security with a runtime solution that is proactive, effective, and frictionless. Oligo found […] The post Publisher’s Spotlight: Oligo: Protect Your Open Source…

Protecting Sensitive Information Within Translation

Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO of Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as […] The post Protecting Sensitive Information Within Translation appeared first…

An Interview with Dasha Deckwerth – Stealth ISS Group

The post An Interview with Dasha Deckwerth – Stealth ISS Group appeared first on Cyber Defense Magazine. This article has been indexed from Cyber Defense Magazine Read the original article: An Interview with Dasha Deckwerth – Stealth ISS Group

Penetration Testing- Shielding the Web Content Against Hacking

Penetration Testing Market size worth over $5.5 Bn by 2031 By Aashi Mishra, Sr. Content Writer, Research Nester In January 2023, a news surfaced the internet that 235 million twitter […] The post Penetration Testing- Shielding the Web Content Against…

OT Under Greater Scrutiny in Global Cybersecurity Regulatory Environment

By Dr. Terence Liu, CEO, TXOne Networks Highly publicized cyberattacks have focused governments globally on re-examining and bolstering their cybersecurity regulations and policies, and it’s not just information technology (IT) […] The post OT Under Greater Scrutiny in Global Cybersecurity…

Measuring the Effectivity of Security with Data Analysis

By Howie Robleza, Freelance Writer, Avigilon Effective security strategies are fundamental to the success of any business with both physical and cyber security of equal importance. Businesses, even with the […] The post Measuring the Effectivity of Security with Data…

Implement Machine Learning to Secure Your IoT Network

By Zac Amos, Features Editor, ReHack Connected devices pose unique security risks and are prone to bot attacks, requiring a tool capable of quickly processing a large amount of information. […] The post Implement Machine Learning to Secure Your IoT…

Hybrid Mesh Firewall Management

By Ulrica de Fort-Menares, VP of Product & Strategy, Indeni What is Hybrid Mesh Firewall? With the rise of hybrid workforces and cloud networks, there is growing demand to secure […] The post Hybrid Mesh Firewall Management appeared first on…

How We Grew Revenue by Strengthening Cybersecurity

Make your security strategy good for business. By David Weisong, CIO at Energy Solutions Utility companies are, like just about all industries, increasingly concerned about cybersecurity—and for good reason. A […] The post How We Grew Revenue by Strengthening Cybersecurity…

Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection

Did you know that only 4% of CISOs have real-time visibility into runtime vulnerabilities in containerized production environments (https://www.dynatrace.com/news/blog/runtime-vulnerability-management-still-vexing-organizations/)?  According to Gartner, by 2025, over 75 percent of organizations will […] The post Publisher’s Spotlight: THREATX – A Cloud-Native Solution…

Five Tips to Securing Your Organization Through Your People.

By Dr. Inka Karppinen, CPsychol. Lead Behavioural Scientist, CybSafe While many commentators continue to tout technological solutions to various cyber security issues, with high-profile cyber-attacks and data breaches continuing to […] The post Five Tips to Securing Your Organization Through…

From Passwords to Passkeys – A Passing of the Torch

The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those without a password manager to keep track, that’s a prompt […] The post From Passwords to Passkeys – A Passing…

Embedding Privacy-First Behaviors for Future Generations

By Michael Levit, Co-Founder and CEO of Tempest As all of our lives have moved online, the collection and sharing of data by big tech and private companies has become […] The post Embedding Privacy-First Behaviors for Future Generations appeared…

Don’t Jump to Conclusions on Zero Trust Adoption

By John Linford, Forum Director, The Open Group Security Forum, and Open Trusted Technology Forum The Open Group Security & Open Trusted Technology (OTTF) Even in an industry known for […] The post Don’t Jump to Conclusions on Zero Trust…

Controlling Cybersecurity Risks

Controlling Cyber Risks and Fraud by Risk Assessment By Hakan Kantas, Senior IT Director We are trying to protect all the Internet connected systems, users, network and other related structures […] The post Controlling Cybersecurity Risks appeared first on Cyber…

What Will Cybersecurity Jobs Look Like in 2028?

By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies What Will Cybersecurity Jobs Look Like in 2028? Macroeconomic turmoil, the Great Resignation, and layoffs by all-star companies – […] The post What Will Cybersecurity Jobs Look Like in…

Heard At RSAC 2023 – Protecting the Protectors

Some Personal Risks to Individual Cybersecurity Practitioners Are Elevated Because Of The Work They Do. Is It Time for Workplace Cyber Protections to Follow Them Home? By Chris Needs, VP […] The post Heard At RSAC 2023 – Protecting the…

Why Cybersecurity Provision is Critical for Businesses, Large and Small

By Astrid Gobardhan, Group Data Protection Officer at VFS Global, the world’s largest outsourcing and technology services specialist Against a backdrop of biting inflation and uncertainty across global markets, many […] The post Why Cybersecurity Provision is Critical for Businesses,…

HEAT Attacks Vs Apts – What Is the Difference?

By Mark Guntrip, Senior Director of Cybersecurity Strategy, Menlo Security A new breed of attacker has emerged, one that has learned to weaponize the web browser. The Highly Evasive Adaptive Threats […] The post HEAT Attacks Vs Apts – What Is…

7 Benefits of Implementing ZTNA

(Zero Trust Network Access) By Howie Robleza, Freelance Writer, Avigilon One of the most significant worries for business leaders in the current climate is the potential for an internal security […] The post 7 Benefits of Implementing ZTNA appeared first…

Biometric as a Service (BaaS) – An Opinion Piece

By Mohit Shrivastava, Chief Analyst ICT, Future Market Insights Biometric as a service (BaaS) works best as a striking alternative to other outmoded biometric software models. It becomes easy for […] The post Biometric as a Service (BaaS) – An…

Why Inadequate Investment in Cybersecurity is a False Economy

By Luke Dash, CEO, ISMS.online Already suffering the most cyberattacks than any other European country [RH1], the UK looks set to experience a proliferation of vulnerabilities as businesses struggle to […] The post Why Inadequate Investment in Cybersecurity is a…

The Next Evolution of Devsecops For The Defense Department

By Jonas Lazo, Vice President of Digital Engineering, Sev1Tech The White House recently proposed an $842 billion budget for the Department of Defense (DOD) for 2024, emphasizing the Administration’s commitment […] The post The Next Evolution of Devsecops For The…

An Interview with Sarah Armstrong-Smith

By Megan Lupton, Senior Content Executive, Champions Speakers Sarah Armstrong-Smith is a globally revered voice in the cyberspace. She is regularly booked for corporate conference and as a Cyber Security […] The post An Interview with Sarah Armstrong-Smith appeared first…

Securing Communications for Operational Military Success

By Nicole Allen, Senior Marketing Executive at Salt Communications. The significance in having Secure Communications for Military Operations. Thanks to expertly planned operational communications, military duties can be carried out […] The post Securing Communications for Operational Military Success appeared…

Operationalizing Zero Trust Architecture

By Chaim Mazal, Chief Security Officer, Gigamon Over the last few years, organizations have been hearing about a Zero Trust architecture (ZTA) as a means for IT leaders to take a […] The post Operationalizing Zero Trust Architecture appeared first on…

How Should CMMC Impact Your Remote Work Policies?

By Zac Amos, Features Editor, ReHack Cybersecurity Maturity Model Certification (CMMC) is another compliance framework defense industrial base (DIB) contractors can add to their toolkits to work for the Department […] The post How Should CMMC Impact Your Remote Work…

How Professional Human Hackers Choose Their Targets

By Peter Warmka, Founder, Counterintelligence Institute Over the past few years, Cybersecurity professionals have acknowledged the increasing need of security awareness training to combat the growing threat from social engineering. […] The post How Professional Human Hackers Choose Their Targets…

Hacks And Data Leaks

How to protect businesses from cyberattacks By Sergey Ozhegov, CEO, SearchInform Hacks and data leaks: how to protect businesses from cyberattacks Hardly a week goes by without a hack or […] The post Hacks And Data Leaks appeared first on…

An Interview with Greg Van Der Gaast

By Megan Lupton, Senior Content Executive, Champions Speakers From one of the most wanted hackers to being featured in the Top Trending Ethical Hackers list, Greg van der Gaast has […] The post An Interview with Greg Van Der Gaast…

What are NIST Encryption Standards? Why Do They Matter a Lot?

By Amar Basic, Co-Founder CyberArrow Data encryption is essential in today’s technologically advanced world to safeguard sensitive information against hacker assaults and data breaches, as an estimated 30,000 websites are […] The post What are NIST Encryption Standards? Why Do…

Empowered Encryption

Why organizations must take back control of their data By Dimitri Nemirovsky, Co-Founder & COO, Atakama Sometimes, what a change represents is more meaningful than the change itself. Case in […] The post Empowered Encryption appeared first on Cyber Defense…

Most Commonly Overlooked Attack Surface Vulnerabilities & How to Fix Them

By Marc Laliberte, Director of Security Operations at WatchGuard Over the last decade, many organizations have rapidly accelerated their digital transformation. The rise in cloud hosted Software-as-a-Service (SaaS) applications, continued […] The post Most Commonly Overlooked Attack Surface Vulnerabilities &…

Investing Wisely

Where to focus spend during the economic downturn By Tim Wallen, Regional Director, UK, US & Emerging Markets, Logpoint There remains a great deal of uncertainty when it comes to […] The post Investing Wisely appeared first on Cyber Defense…

Online Privacy Statistics

By Milos Djordjevic, Online Privacy Expert, VPN Central Online privacy is a burning issue in our modern threat landscape. It concerns both companies and individuals — no one can afford […] The post Online Privacy Statistics appeared first on Cyber…

Before You Deploy Advanced Tech, Consider the Hidden Cyberthreats

By Jennifer Varner, Director Security Solutions Sales – North America, Verizon Business Every year, emerging technologies come to market, offering new opportunities to connect with employees and customers in previously […] The post Before You Deploy Advanced Tech, Consider the…

From AI-driven Defense to Dark Web Threat Intelligence

How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […] The post From AI-driven Defense to Dark Web Threat…

Protecting Sensitive Information Within Translation

Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO, Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as financial […] The post Protecting Sensitive Information Within Translation appeared first…

How Secure Communication Can Enhance Your Organization’s Cyber Defence

By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due to an exponential increase of interconnected devices, systems, infrastructures inside […] The post How Secure Communication Can Enhance Your Organization’s…

The 2023 State of Ransomware: A Resurgence Is Brewing

By Bob Maley, CSO at Black Kite After last year’s good fight against ransomware gangs, CISOs thought they won. Overall attacks were down and ransom payments dropped 40%. In fact, […] The post The 2023 State of Ransomware: A Resurgence…

Do Highly Intelligent Language Models Pose a Cyber Threat?

By Brett Raybould, EMEA Solutions Architect, Menlo Security It is estimated that as many as 100 million users have engaged with AI chatbot, ChatGPT, since it was released at the […] The post Do Highly Intelligent Language Models Pose a…

Now is the Time for the Thoughtful Regulation of Crypto

By Hugh Brooks, Director of Security Operations, CertiK The rapid expansion of the cryptocurrency industry has brought technological innovation and financial inclusion, while promising a freer and fairer global financial […] The post Now is the Time for the Thoughtful…

A Look At The Damages Covered By Corporate Cyber Insurance

By Taylor McKnight, Digital Marketing PR Specialist, Tivly Consider cyber liability insurance to protect your business from a data breach or cyber-attack. This type of insurance covers the costs associated […] The post A Look At The Damages Covered By…

Navigating Your Way to Resiliency in Four Steps

By Shane Steiger, Principal Cybersecurity Engineer, MITRE Cyber resiliency. The concept has been around for many years. No doubt you’ve seen the images, such as a tiny flower emerging among […] The post Navigating Your Way to Resiliency in Four…

5 Benefits Of SIEM To The Cybersecurity Of Any Business

By Aaron Haynes, a Columnist at Loganix.com Cybersecurity is a top priority for many businesses today because of the significant threats they face from hackers and cybercriminals. Companies now deal […] The post 5 Benefits Of SIEM To The Cybersecurity…

Communicating Cyber Risk

CISOs struggle with the board amidst an economic downturn. By Tim Fleming, Strategic Advisor, Silverfort Cyber risk is now nailed firmly to the board table. A seemingly never-ending procession of […] The post Communicating Cyber Risk appeared first on Cyber…

Is ChatGPT Ready to Disrupt Cybersecurity?

By Anurag Gurtu, Co-Founder & CPO, StrikeReady We’ve seen so many advancements in artificial intelligence within just a few years. ChatGPT is definitely one of the most recent ones – […] The post Is ChatGPT Ready to Disrupt Cybersecurity? appeared…

Cyber Risk Quantification: A New Way to Understand Security Risks

CRQ can identify security improvements, prioritize implementation and justify security investments. Here’s how to make it work for your organization. By Bruno Farinelli, Senior Director of Operations and Analytics, ClearSale […] The post Cyber Risk Quantification: A New Way to…

Evolution of the CISO Role

By Jaye Tillson, Director of Strategy, Axis Security Evolution of the CISO Role The Chief Information Security Officer (CISO) role is relatively new in the corporate world, with its origins […] The post Evolution of the CISO Role appeared first…

Closing The Cyber Marketing Gap with Investors

Positioning security as a stakeholder value proposition By Patrick Kehoe, Chief Marketing Officer at Coalfire With breaches and shutdowns making daily headlines, no one wants to do business anymore with […] The post Closing The Cyber Marketing Gap with Investors…

The Data Dilemma: Balancing Business Growth and Security

By Noah Johnson, Co-Founder & CTO of Dasera In today’s digital age, data is the lifeblood of business growth. With large amounts of data sprawled across multiple platforms, companies must […] The post The Data Dilemma: Balancing Business Growth and…

Considering All Returns on a Cybersecurity Compliance Program

By Doug Barbin, Chief Growth Officer and Managing Principal at Schellman C-Suite executives have many variables to consider when they are implementing changes or making investments at an enterprise level. […] The post Considering All Returns on a Cybersecurity Compliance…

Risk: Everything Everywhere All at Once

It’s Time to Get Proactive About Risk Reduction By Marc Gaffan, CEO of IONIX The first quarter of 2023 is being dominated by a singular theme, re-thinking risk. We came […] The post Risk: Everything Everywhere All at Once appeared…

Ransomware Takes No Prisoners

By Monica Oravcova, COO and Co-Founder of Naoris Protocol The recent Killnet cyberattack that disrupted contact between NATO and military aircraft providing aid to victims of the Turkish-Syrian earthquake, is […] The post Ransomware Takes No Prisoners appeared first on…

Leadership Is Still Washing Their Hands of Cyber Risk

By John A. Smith, CEO of Conversant Group Where it comes to owning responsibility for cyber risk, executive leadership has moved in and out of the spotlight like character actors […] The post Leadership Is Still Washing Their Hands of…

Protecting Accounting Firms from Cyberattacks

Cybersecurity Practices Must Be A Top Priority For Firms This Busy Season By Alan Hartwell, Chief Technology Officer at IRIS Software Group Financial service firms are a top target for […] The post Protecting Accounting Firms from Cyberattacks appeared first…

New Cyber Threats Calls for New Approaches

By Mark Sincevich, Federal Director of Illumio Data compromises hit record numbers in 2021 with 1,826 occurrences reported, up 23 percent from 2017. In the last two years alone, 66 […] The post New Cyber Threats Calls for New Approaches…

Stop Backing Up Ransomware

By James Gorman, Cyber Security Expert and Entrepreneur When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for the cloud environment. However, having […] The post Stop Backing Up Ransomware appeared first on…

Understanding The Concept of Privacy By Design

By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and Privacy Commissioner Ann Cavoukian, is a comprehensive approach to privacy […] The post Understanding The Concept of Privacy By Design…

The Data Challenge: How to Map Data in A Distributed World

By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies Here’s a quick-fire question: do you know where all your sensitive data is? As businesses of all sizes […] The post The Data Challenge: How to Map Data…

Cyberattacks on City and Municipal Governments

Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago.  The increase in breaches is likely due to several factors, including the […] The post Cyberattacks on City and Municipal Governments appeared…

Cyber Attack as an Asymmetric Threat

By Milica D. Djekic, Independent Researcher Abstract: Cyberspace is yet unsafe environment for communication and data transfer. Hacker’s organizations can target many servers, datacenters and endpoints relying on capacities of […] The post Cyber Attack as an Asymmetric Threat appeared…

SIEM for SAP – Log Evaluation to Attack Detection

By Christoph Nagy, CEO of SecurityBridge To detect attacks on SAP, you need to evaluate the security logs in SAP. While many organizations have spent the past few years protecting […] The post SIEM for SAP – Log Evaluation to…

Collaboration is Key to Building Industrial Cyber Resilience

By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis Specialist at the World Economic Forum`s Centre for Cybersecurity Industries […] The post Collaboration is Key to Building Industrial Cyber…