By Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and environments, there are important deployment and security considerations. While still […] The post How 5G Networks Are Secured and Enabled…
Tag: Cyber Defense Magazine
The Rise in Cyber-Attacks from Bad International Actors
There has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems from organizations approaching encryption wrong. By Scott Bledsoe, CEO, Theon Technology […] The post The Rise in Cyber-Attacks from Bad International…
Doenerium: When Stealing from Thieves Is Also a Crime
By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat experts uncovered a particularly worrying and sophisticated phishing attack that […] The post Doenerium: When Stealing from Thieves Is Also…
Five Ways to Keep Endpoint Protection Simple
By Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve. In fact, research shows that 68% of organizations have experienced […] The post Five Ways to Keep Endpoint Protection Simple…
DevSecOps and Digital Transformation: Bridging the Security Gap
How DevSecOps Ensure Security in Development Lifecycle? By Sudeep Srivastava, CEO, Appinventiv The Covid-19 pandemic has accelerated digital transformation to a staggering speed. However, for most organizations going digital has […] The post DevSecOps and Digital Transformation: Bridging the Security…
Why Defensive Superiority Should Rein Over Offensive Capability
By Marcus Fowler, SVP of Strategic Engagements and Threats at Darktrace Amid a near-constant cycle of cyber incidents globally, organizations and institutions in both the private and public sectors must […] The post Why Defensive Superiority Should Rein Over Offensive…
As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture
By Jonathan Goldberger, SVP Security Practice, TPx The increasingly dangerous security landscape is particularly concerning to businesses, as they face increasing cyberattack threats. Instead of fearing the unknown, business owners […] The post As Online Threats Facing Businesses Grow, Companies…
Applying the NIST Framework to Ransomware Risk Management
Top Takeaways for Preparing for and Managing a Ransomware Attack with NISTIR 8374 By Gil Kirkpatrick, Microsoft MVP […] The post Applying the NIST Framework to Ransomware Risk Management appeared first on Cyber Defense Magazine. This article has been indexed…
Compliance Is the Key to Unlocking Government Contractor Success
By Dan Firrincili, Senior Manager, Product Marketing at Deltek In 2021, President Biden signed the Cybersecurity Executive Order […] The post Compliance Is the Key to Unlocking Government Contractor Success appeared first on Cyber Defense Magazine. This article has been…
Cyber Threats Driving Insurance Claims Activity
By Scott Sayce, Global Head of Cyber and Group Head of the Cyber Centre of Competence at Allianz […] The post Cyber Threats Driving Insurance Claims Activity appeared first on Cyber Defense Magazine. This article has been indexed from Cyber…
Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?
By Geoffrey Lottenberg Imagine a swarm of termites secretly and incessantly feeding on your home. In relative silence, […] The post Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive? appeared first on Cyber Defense Magazine.…
Automated Patch Management Can Protect Your Business from A Data Disaster
By Sami Mäkiniemelä, Chief Security Officer, Miradore It’s easy to identify security needs from physical threats we can […] The post Automated Patch Management Can Protect Your Business from A Data Disaster appeared first on Cyber Defense Magazine. This article…
Common Vulnerabilities of Enterprise Web Security That Demands Your Attention
By Eden Allen, Cyber Security Educator, CheapSSLWeb Years ago, the way leading enterprise-level concerns were viewed differed from […] The post Common Vulnerabilities of Enterprise Web Security That Demands Your Attention appeared first on Cyber Defense Magazine. This article has…
5 Ways to Protect Your Workplace from Cybersecurity Threats
By Nicole Allen, Senior Marketing Executive, Salt Communications. The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving […] The post 5 Ways to Protect Your Workplace from Cybersecurity Threats appeared first on Cyber Defense Magazine. This article has been…
What is a mobile possession factor – and how can it replace passwords to stop phishing?
By Paul McGuire, Co-Founder and CEO of tru.ID We all use email, and we all use passwords – […] The post What is a mobile possession factor – and how can it replace passwords to stop phishing? appeared first on…
AI Is the Answer To Modern Cybersecurity Threats
Why embracing AI solutions is key to combatting evolving cyber threats across many sectors. By Ralph Chammah, CEO, […] The post AI Is the Answer To Modern Cybersecurity Threats appeared first on Cyber Defense Magazine. This article has been indexed…
Why Seeing Your Network Through a Hacker’s Eyes Helps Defend It
By Nick Merritt, Vice President of Security Products and Services, Halo Security Business leaders are confronted with headlines […] The post Why Seeing Your Network Through a Hacker’s Eyes Helps Defend It appeared first on Cyber Defense Magazine. This article…
Zero Trust is More Than a Buzzword
Five Steps to Data-Centric Zero Trust Architecture That Works By Terry Ray, SVP Data Security GTM, Field CTO […] The post Zero Trust is More Than a Buzzword appeared first on Cyber Defense Magazine. This article has been indexed from…
Data, Privacy, And the Future of Artificial Intelligence
By Michael G. McLaughlin, Associate, Baker, Donelson, Bearman, Caldwell & Berkowitz, PC Data privacy and protection have become […] The post Data, Privacy, And the Future of Artificial Intelligence appeared first on Cyber Defense Magazine. This article has been indexed…
WatchGuard’s 2022 Cybersecurity Prediction Mid-Year Review
By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies Every year, the WatchGuard Threat Labs team releases our annual […] The post WatchGuard’s 2022 Cybersecurity Prediction Mid-Year Review appeared first on Cyber Defense Magazine. This article has been indexed from Cyber…
Cyber Defense Media Group – 11 Year Anniversary – Daily Celebration in 2023
IT’S A BIG, BOLD, BEAUTIFUL 2023 – OUR 11TH ANNIVERSARY We’re celebrating this milestone every day this year […] The post Cyber Defense Media Group – 11 Year Anniversary – Daily Celebration in 2023 appeared first on Cyber Defense Magazine.…
What we can learn from The Undeclared War
By Nicole Allen, Senior Marketing Executive at Salt Communications The Undeclared War, a drama series on Channel 4, […] The post What we can learn from The Undeclared War appeared first on Cyber Defense Magazine. This article has been indexed…