Tag: Cyber Defense Magazine

SAP Debugger’s Power and Danger

By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar where the Service Advertising Protocol (“SAP”) representative explained a recently […] The post SAP Debugger’s Power and Danger appeared first…

Blockchain Startups Are Drawing Substantial Venture Capital Funding

By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights Blockchain technology is becoming more popular owing to the various benefits businesses get from it- supply chain management, decentralized finance, […] The post Blockchain Startups Are Drawing Substantial Venture Capital…

Strengths and Vulnerabilities of AI Applications to Health Care

By Edward Maule, Chief Information Officer and Chief Information Security Officer at Advocare, LLC Artificial intelligence (AI) has made significant advancements in the healthcare sector, and its potential is almost […] The post Strengths and Vulnerabilities of AI Applications to…

2023 Predictions

By Anurag Gurtu, Chief Product Officer at Strike Ready In 2022, the global average total breach cost surpassed $4.35M, and nearly two-thirds of organizations experienced more than one breach. As […] The post 2023 Predictions appeared first on Cyber Defense…

ChatGPT and You

Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer at Sangfor Technologies Okay, I admit the title is clickbait to get you to read this article. […] The post ChatGPT and You appeared first on Cyber…

Security Tool Integration Isn’t Enough Anymore

By Manoj Arora, Founder & CEO, Difenda Organizations today are overwhelmed with options when it comes to security tools and technologies. In the past, best-of-breed security technology meant having the […] The post Security Tool Integration Isn’t Enough Anymore appeared…

Complexity is Still the Enemy of Security

Ease of Use, Ease of Integration Encourages Data Protection By Gregory Hoffer, CEO of Coviant Software In 1999 noted cybersecurity expert Bruce Schneier wrote in his Schneier on Security blog […] The post Complexity is Still the Enemy of Security…

How to Improve your Security Posture and ROI

By Mark Evans, VP Marketing and Packet Capture Evangelist at Endace Let’s assume your security team has completed all the “low-hanging fruit” security essentials. They’ve made sure all the basic […] The post How to Improve your Security Posture and…

ImmuniWeb AI Platform

Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […] The post ImmuniWeb AI Platform appeared first on Cyber…

OT Zero Trust

The Last Frontier to Protect OT Environments By Terence Liu, CEO, TXOne Networks OT Zero Trust – a Device-Centric Methodology In the IT world, the heart of Zero Trust is […] The post OT Zero Trust appeared first on Cyber…

2023: What Awaits Us?

By Ashley Stephenson, CTO, Corero Network Security When it comes to cyber security, one thing that 2022 and just about any recent year will be remembered for is the succession […] The post 2023: What Awaits Us? appeared first on…

ChatGPT and You

Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer, Sangfor Technologies Okay, I admit the title is clickbait to get you to read this article. There […] The post ChatGPT and You appeared first on Cyber…

The Practical Side of ZTNA: How it Helps Harden Defenses

By Timothy Liu, CTO and co-founder, Hillstone Networks In the cybersecurity world, buzzwords seem proliferate with the changing of the wind. Currently zero-trust network access, or ZTNA, is getting its […] The post The Practical Side of ZTNA: How it…

Cloud Visibility and Port Spoofing: the “Known Unknown”

By Stephen Goudreault, Cloud Security Evangelist, Gigamon As with all technology, new tools are iterations built on what came before and classic network logging and metrics are no different. The […] The post Cloud Visibility and Port Spoofing: the “Known…

A Question of Doubt

The cyber security crisis of confidence amongst CISOs and CIOs — and how to overcome it. By Gary Penolver, Chief Technology Officer at Quod Orbis I’ve worked closely with CISOs […] The post A Question of Doubt appeared first on…

Eight Tips for CISOs Trying Get Their Board on Board

By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role in strategic decision-making in enterprises. Yet CISOs frequently find themselves […] The post Eight Tips for CISOs Trying Get Their…

Zero Trust in a DevOps World

By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical to securing people, devices, infrastructure, and applications – all of […] The post Zero Trust in a DevOps World appeared…

Why You Can’t Have True Zero Trust Without API Security

By Richard Bird, Chief Security Officer, Traceable Global adoption of Zero Trust security models is soaring and with good reason. Due to organizations’ embrace of digital business models and enablement […] The post Why You Can’t Have True Zero Trust…

Vulnerability Prioritization is Not a One-Size Fits All Approach

By Victor Gamra, CISSP, Founder and CEO of FortifyData System vulnerabilities are ever increasing as adoption of new and emerging technologies are implemented. Security professionals struggle to keep up with […] The post Vulnerability Prioritization is Not a One-Size Fits…

Solving The AppSec Dilemma Across the Entire SDLC

Why organizations should adopt an integrated and continuous approach to application security education By Amy Baker, Security Education Evangelist, Security Journey The software supply chain is under increasing threat. With […] The post Solving The AppSec Dilemma Across the Entire…

Securing Collaboration at the Speed of Business

By Ofer Klein, CEO and co-founder, Reco Recent research found that 96% of business leaders believe that effective communication is key to a productive remote or hybrid work. And Slack […] The post Securing Collaboration at the Speed of Business…

Sell tickets to Fans, Not to Bots.

By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase a ticket for an event only to discover they are […] The post Sell tickets to Fans, Not to Bots.…

Product Review of SpecOps Password Policy

Looking for a tool to validate if your Active Directory (AD) passwords are safe across your Enterprise? Why would this be important? There are a few solutions in the industry […] The post Product Review of SpecOps Password Policy appeared…

Lessons From the Uber Hack

By Tomasz Kowalski, CEO and Co-Founder, Secfense For decades, cybersecurity experts have been warning us against weak or stolen passwords. Two-factor authentication (2FA) has always been pointed out as the […] The post Lessons From the Uber Hack appeared first…

Our Nation Needs Comprehensive AI Legislation, And Soon

By Dr. Allen Badeau, Chief Technology Officer, Empower AI The White House recently launched an “AI Bill of Rights” framework to lay the groundwork for the future creation and use […] The post Our Nation Needs Comprehensive AI Legislation, And…

How Zero Trust Enables More Effective Security Management

Moving to Zero Trust Architecture as a standard By Jim Hietala, Vice President of Business Development and Security at The Open Group There’s a huge buzz around Zero Trust in […] The post How Zero Trust Enables More Effective Security…

Industry Experts Share Their Security Predictions for 2023

Insights on the trends all businesses need to look out for By Multiple Authors It’s no surprise that security is a major topic of conversation, with cyberattacks of all kinds […] The post Industry Experts Share Their Security Predictions for…

Making the most of your time at the RSA 2023 conference

Ben Rothke, CISSP, CISM, CISA, is a Senior Information Security Manager at Tapad Going to RSA 2023? Failing to plan is planning to fail. With the RSA 2023 conference starting on April […] The post Making the most of your time at…

Has Adoption of ‘Connected Devices’ Outpaced Security?

By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of connected devices but the speed at which these devices have […] The post Has Adoption of ‘Connected Devices’ Outpaced Security?…

How to Stay GDPR Compliant While Sending Cold Emails

Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important marketing technique for any business that depends on reaching new, […] The post How to Stay GDPR Compliant While Sending…

Cybersecurity: Your Guide to Digital Identity

Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works and why it matters. By Filip Verreth, VP Product Management […] The post Cybersecurity: Your Guide to Digital Identity appeared…

Does Your Company Have a Dark Data Problem?

By Dannie Combs, SVP and Chief Information Security Officer, Donnelley Financial Solutions (DFIN) Don’t let the name fool you: dark data is all too visible — to bad actors, that […] The post Does Your Company Have a Dark Data…

Cybersecurity Attacks To Come: Here’s How To Prepare

By Russ Reeder, CEO, Netrix Global Ensuring 100% prevention against all cyberattacks is impossible today, as modern perpetrators find more sophisticated ways to strike by the minute. A strategy focusing […] The post Cybersecurity Attacks To Come: Here’s How To…

Busting Myths Around Cybersecurity Team Training

New Research Results from Omdia and Cybrary Point to Substantial ROI From Continuous Upskilling of Cybersecurity Teams. By Kevin Hanes, CEO, Cybary In recent years, cybersecurity has garnered a staggering […] The post Busting Myths Around Cybersecurity Team Training appeared…

5 Best Practices for a Multi-Factor Authentication (MFA) Strategy

By Zac Amos, Features Editor, ReHack Organizations and individuals must implement multi-factor authentication strategies to enhance any cybersecurity risk management plan. Cyberthreats have always been creative, but increasing attacks requires […] The post 5 Best Practices for a Multi-Factor Authentication…

2023 Predictions

By Dr. Chenxi Wang, Founder and Managing General Partner, Rain Capital For venture capitalists and investors with an eye on technology, 2022 was a chaotic year. This turmoil was partly […] The post 2023 Predictions appeared first on Cyber Defense…

The Future of Online Privacy

By Mia Naumoska, Chief Marketing Officer at Internxt You’ve probably noticed that there’s a lot of bad news about online privacy these days. Security breaches and data leaks are everywhere, […] The post The Future of Online Privacy appeared first…

4 Key Security Trends For 2023

By Jonathan Lee, Senior Product Manager, Menlo Security 2022 has unfortunately failed to live up to hopes for calmer waters. While it seems as though the worst effects of the […] The post 4 Key Security Trends For 2023 appeared…

Why Low-Code AI Is Needed Now More Than Ever

By Solomon Ray, Director of Innovation, Strategy, and Special Projects at Iterate.ai As a business leader and executive, a “low-code strategy” may not be on the top of your mind, […] The post Why Low-Code AI Is Needed Now More…

SMB Cyber Insurance: The End of Innocence

By Nadav Arbel, Co-founder & CEO, CYREBRO The cyber insurance landscape has changed dramatically in recent years – for both insurers and policyholders. In many ways, the past two years […] The post SMB Cyber Insurance: The End of Innocence…

Why Power Matters in Cyber Protection

Defending power management equipment in an era of more connectivity By James Martin, Global Connectivity Product Manager, Eaton It’s well understood that as digital evolution continues opening doors for greater […] The post Why Power Matters in Cyber Protection appeared…

Cyber Defense Magazine– PQC & Biometrics

Why biometric security is crucial in a post-quantum world By Nils Gerhardt, Chief Technology Officer for Utimaco Many are saying that passwords have now become obsolete – they can be […] The post Cyber Defense Magazine– PQC & Biometrics appeared…

Virtual Security and why it matters so much to SMEs

By Jack Viljoen, Head of Marketing, Prodinity In recent years, there has been an exponential rise in the number of cyber criminals targeting small to medium-sized businesses (SMEs) – many […] The post Virtual Security and why it matters so…

Top 100 Women in Cybersecurity

Abbott Ekta Sirwani https://www.linkedin.com/in/ekta-sirwani/ Absolute Christy Wyatt https://www.linkedin.com/in/christywyatt/ Alert Logic Sydna Kelley https://www.linkedin.com/in/sydnakelley/ Alta Associates Joyce Brocaglia https://www.linkedin.com/in/joycebrocaglia/ AppEsteem Corporation Hong Jai https://www.linkedin.com/in/hong-jia-02234654/ Assurant Marilyn Piccolo https://www.linkedin.com/in/marilyn-piccolo-777a728/ Attivo Networks Sarah […] The post Top 100 Women in Cybersecurity appeared first…

User Behavior Analytics in Case Management

By Milica D. Djekic, Independent Researcher from Subotica,  the Republic of Serbia. Abstract: Some criminology studies suggest crime can be committed by coping with some schemes, plans or patterns as […] The post User Behavior Analytics in Case Management appeared…

Top 100 Cybersecurity Startups

  10dot https://10dot.com/ Acronis https://www.acronis.com/ Alertot https://www.alertot.com/ Aqua https://www.aquasec.com/ Argus Security https://www.argussecurity.it/ Augmenta Cyber Security https://augcyba.com/ Auth0 https://auth0.com/ Authomize https://www.authomize.com/ Axis Security https://www.axissecurity.com/ Axonius https://www.axonius.com/ Axur https://axur.com/ Balbix https://www.balbix.com/ Black […] The post Top 100 Cybersecurity Startups appeared first on…

Top 100 CISOs

  These CISOs competed against thousands of candidates for this prestigious award.  Judges look at these candidates, searching for the most innovative, with unparalleled success in communicating with their boards […] The post Top 100 CISOs appeared first on Cyber…

The Top 10 Predictions For The Cybersecurity Industry In 2023

By Christopher Prewitt, Chief Technology Officer, Inversion6 Technology never stops moving forward. Each new year brings changes which create downstream effects on how we are attacked and how we defend […] The post The Top 10 Predictions For The Cybersecurity…

Understand And Reduce The Sap Attack Surface

By Christoph Nagy, CEO & Co-Founder, SecurityBridge Knowing the attack surface in today’s world is very important to reduce the risk of exploitation of the so-called unknown-unknown. Zero days are […] The post Understand And Reduce The Sap Attack Surface…

The Quantum Threat: Our Government Knows More Than You Do

By Skip Sanzeri, COO and Founder, QuSecure, Inc. Quantum computers are extremely powerful machines that utilize subatomic properties providing amazing potential to change the way that we process information and […] The post The Quantum Threat: Our Government Knows More…

The Psychology Behind Spear Phishing Scams

By Dr. Yvonne Bernard, CTO, Hornetsecurity Criminals are increasingly using fake emails to exploit their victims for financial gain and are using spear phishing takes the well-known social engineering scam […] The post The Psychology Behind Spear Phishing Scams appeared…

The Benefits of eBPF for API Security

By Sanjay Nagaraj, Co-Founder & CTO of Traceable AI You might hear the term “eBPF” mentioned when chatting to DevOps and DevSecOps folks about network, infrastructure or security management. eBPF […] The post The Benefits of eBPF for API Security…

Table Stakes Security Services for 2023

By Jim Mundy, Director of Security Operations, Segra Most business owners may be aware of cybersecurity defenses such as firewall, DDoS prevention, or various endpoint protection solutions, and assume some […] The post Table Stakes Security Services for 2023 appeared…

NetFlow’s Dirty Little Secret

By Mark Evans, VP Marketing, Endace Many organizations assume their security tools can see everything that happens across the network to detect potential threats. Unfortunately, that’s not the case, for […] The post NetFlow’s Dirty Little Secret appeared first on…

Secure APIs to Drive Digital Business

By Mourad Jaakou, General Manager Amplify at Axway Back in 2010, API Evangelist blogger Kin Lane posited that application programming interfaces (APIs) are driving the Internet and our economy. A […] The post Secure APIs to Drive Digital Business appeared…

Table Stakes Security Services for 2023

By Jim Mundy, Director of Security Operations, Segra Most business owners may be aware of cybersecurity defenses such as firewall, DDoS prevention, or various endpoint protection solutions, and assume some […] The post Table Stakes Security Services for 2023 appeared…

Moola Market Manipulation

Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a non-custodial liquidity protocol operating on the Celo blockchain – suffered […] The post Moola Market Manipulation appeared first on Cyber…

Managing Cybersecurity for Critical National Infrastructure

General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant, Artech, LLC What’s the reality of managing a cybersecurity program […] The post Managing Cybersecurity for Critical National Infrastructure appeared…

Remote Workers Face Growing Threats from Phishing Attacks

Analysis Shows Phishing Strikes Up 61% Over 2021,  With a 50% Increase on Mobile Devices By Patrick Harr, CEO, SlashNext Hybrid offices and BYOD policies have reorganized the workplace forever, […] The post Remote Workers Face Growing Threats from Phishing…

Infrastructure-as-Code Security: a Critical Responsibility

By Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries. Although its principles have been established for over half a […] The post Infrastructure-as-Code Security: a Critical Responsibility appeared first…