Digital transformation in manufacturing has opened doors to promising possibilities, but not without new risk exposure. With expansive transformation comes additional threats. As manufacturers embrace automation, IoT integration, and cloud-based… The post Small Manufacturers, Big Target: The Growing Cyber Threat…
Tag: Cyber Defense Magazine
Securing the Connected Factory Floor
As manufacturers strive to keep pace with changing demands and quickly evolving technologies, many are embracing digitalization and increased connectivity between information technology (IT) and operational technology (OT) environments. The… The post Securing the Connected Factory Floor appeared first on…
On Constant Community Improvements
The theme of this year’s RSAC is “Many Voices. One Community.” While our field can rightly claim “many voices”, portraying it as a “community” is a bit of a stretch…. The post On Constant Community Improvements appeared first on Cyber…
One Piece of the Puzzle: How a Single Digital Identifier Can Unravel Your Entire Online Life
In an era where our lives are increasingly lived online, our digital identities are sprawling networks of accounts and personal data. A simple email address or phone number—often considered a… The post One Piece of the Puzzle: How a Single…
How To Strengthen the Security of Your Symfony-Based Solution
Like all web-based solutions, applications built with Symfony are exposed to various cyber threats, and you should be ready to address them to make your website or app secure. After… The post How To Strengthen the Security of Your Symfony-Based…
How to Use Risk Management to Strengthen Business Cybersecurity
Cybersecurity is a massive point of emphasis for most businesses in the modern age. You must work diligently to protect your company from hackers, scams, phishing emails, and data loss…. The post How to Use Risk Management to Strengthen Business…
Implementing Effective AI Guardrails: A Cybersecurity Framework
As organizations race to implement AI solutions, security leaders face the challenge of enabling progress while protecting sensitive data. Grand Canyon Education (GCE), which serves 22 university partners, recently confronted this… The post Implementing Effective AI Guardrails: A Cybersecurity Framework appeared…
Scaling Smart: Federal Leaders Prioritize AI Security and Resilience
The biggest threat to artificial intelligence (AI) in government isn’t hype – it’s inertia. As Federal agencies explore opportunities to integrate AI into mission operations and citizen service functions (alongside… The post Scaling Smart: Federal Leaders Prioritize AI Security and…
Modernizing Critical Infrastructure Security to Meet Today’s Threats
Ransomware attacks are no longer just a cybersecurity concern – they are a direct threat to national security. A recent study found that among organizations hit by ransomware in the past 12… The post Modernizing Critical Infrastructure Security to Meet Today’s Threats…
Key Cybersecurity Considerations for 2025
As we usher in a new year, it’s crucial to focus on key areas in cybersecurity that demand our attention. While there’s undoubtedly a long list of issues that all… The post Key Cybersecurity Considerations for 2025 appeared first on…
Make the Most of Your Holiday Cybersecurity Awareness Efforts
The holiday season is a time for joy, celebration, and, unfortunately, an uptick in cyber threats. From phishing scams that mimic festive deals to exploitation of end-of-year operational freezes, cybercriminals… The post Make the Most of Your Holiday Cybersecurity Awareness…
2025 Cyber Security Predictions: Navigating the Ever-Evolving Threat Landscape
As we look ahead to 2025, the world of cyber security is set to undergo significant changes. Attackers are becoming increasingly more sophisticated with the use of AI, making phishing… The post 2025 Cyber Security Predictions: Navigating the Ever-Evolving Threat…
Not Just Another List of Top 10 Metrics You Should Measure
In the world of cybersecurity, we’ve all encountered those articles: lists that tell us the top ten metrics to track to improve performance, strengthen security posture or communicate and impress the… The post Not Just Another List of Top 10 Metrics…
Now Is Not the Time to Cut Back on Security Teams
Generative artificial intelligence (AI) is revolutionising the way businesses operate. The widespread adoption and integration of models, such as OpenAI’s ChatGPT and Google’s Gemini, into everyday organisational processes has resulted… The post Now Is Not the Time to Cut Back…
Innovator Spotlight: LatticaAI
Lattica’s Mission: Making Private AI a Reality with the Power of Fully Homomorphic Encryption In the buzz-heavy world of AI and cybersecurity, it’s not every day a company steps out… The post Innovator Spotlight: LatticaAI appeared first on Cyber Defense…
The Story of Jericho Security
Redefining Cybersecurity for the AI Era With the launch of ChatGPT, everything changed – overnight, AI became democratized. But while everyday users turned to AI for grocery lists and grammar… The post The Story of Jericho Security appeared first on…
How CISOs Can Master Operational Control Assurance — And Why It Matters
Chief Information Security Officers are facing rising pressure to ensure robust security and compliance across globally distributed environments. Managing multiple security tools and platforms while avoiding inconsistencies and gaps in… The post How CISOs Can Master Operational Control Assurance —…
One Vendor Delivers 100% Protection And 100% Detection Visibility in MITRE ATT&CK Evaluation
Priority number one for cybersecurity leaders across small-to-medium enterprises (SMEs) and managed service providers (MSPs) is to ensure IT environments are up and running. To proactively minimize the risk of… The post One Vendor Delivers 100% Protection And 100% Detection…
The Illusion of Truth: The Risks and Responses to Deepfake Technology
Abstract In the age of information, where the line between reality and fiction is increasingly blurred, deepfake technology has emerged as a powerful tool with both immense potential and significant… The post The Illusion of Truth: The Risks and Responses…
The Internet of Things Design Challenges
Developing an engineering project is a challenge by itself. In the practice, dealing with some product or service is very requiring and it can take a couple of phases from… The post The Internet of Things Design Challenges appeared first…