Tag: Cyber Defense Magazine

Safeguarding Children in the Era of Big Data

By Ron Kerbs, CEO, Kidas In the ever-evolving landscape of cyberspace, 2023 unveiled a concerning trend: major players in the tech industry, including giants like Meta and Discord, were found […] The post Safeguarding Children in the Era of Big…

Securing Space Infrastructure for US And Allied Collaboration

By Kevin Kelly, CEO and Chairman, Arcfield As the role of satellite communication systems in geopolitical conflicts and critical infrastructure sectors continues to expand, concern regarding the security of satellite […] The post Securing Space Infrastructure for US And Allied…

Ransom-War Escalation: The New Frontline in Cyber Warfare

By Nissim Ben Saadon, Director of Innovation, CYREBRO High-profile ransomware attacks against government targets in Costa Rica and Peru last year brought a new twist to the concept of cyberwar: […] The post Ransom-War Escalation: The New Frontline in Cyber…

Hyperautomation: Revolutionizing the Security Market

By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) Hyperautomation: Revolutionizing the Security Market In today’s digital age, the security landscape is constantly […] The post Hyperautomation: Revolutionizing the Security Market appeared first…

How Businesses Can Manage Cryptocurrency Fraud

With cryptocurrency payments on the rise, businesses must learn how to safeguard against potential risks. By James Hunt, Subject Matter Expert Payments, Feedzai Businesses across the US are seeking innovative […] The post How Businesses Can Manage Cryptocurrency Fraud appeared…

Cyber Resilience – Beyond Cyber Security

In a world where 100% security is not possible, we need to be resilient as we strive to be secure. By James Gorman, Hard2hack.com The evolving landscape of cyber threats […] The post Cyber Resilience – Beyond Cyber Security appeared…

An Interview With Jeffrey Stephens

🔒 Dive into the electrifying world of cyber espionage and the ghost chip with Jeffrey S. Stephens on @CyberDefenseTV! 💻 Unravel the gripping tale of Nick Reagan’s pursuit of “Enemies […] The post An Interview With Jeffrey Stephens appeared first…

Cybersecurity Preparedness 2024

By Chris Leach, Board Advisor for Judy Security The new year is just around the corner.  We have had a great Thanksgiving meal and soon our thoughts will turn to […] The post Cybersecurity Preparedness 2024 appeared first on Cyber…

Evolution and Escalation of Cybersecurity Threats

The Darwinian Effect in the Threat Community By Augusto Barros, Vice President Cyber Security Evangelist at Securonix Among the typical predictions for the upcoming new year, we often see something […] The post Evolution and Escalation of Cybersecurity Threats appeared…

Reshaping the Focus of Cybersecurity

Key Insights from the International Counter Ransomware Initiative Statement By Todd Thorsen, Chief Information Security Officer, CrashPlan Earlier in November, media outlets widely reported the contents of a remarkable joint […] The post Reshaping the Focus of Cybersecurity appeared first…

MGM & Caesars Cyberattacks: Lessons Learned

By Tim Callan, Chief Experience Officer, Sectigo In the aftermath of the MGM and Caesars cyberattacks, many IT professionals are probably asking themselves, am I next? What lessons can businesses […] The post MGM & Caesars Cyberattacks: Lessons Learned appeared…

NIS 2: From Obligation to Opportunity

By Jacques de La Rivière, CEO, Gatewatcher The world of cybersecurity is constantly evolving; not only in talent, products, and technologies, but also in regulatory requirements. As cyber threats evolve […] The post NIS 2: From Obligation to Opportunity appeared…

Top 6 Security Challenges of SMEs

By Michal Gil, Head of Product, CybeReady Small to Medium Enterprises (SMEs) are vital for innovation and economic growth, and their role in larger supply chains makes them an attractive […] The post Top 6 Security Challenges of SMEs appeared…

Is 2024 the Year of Cloud Repatriation?

By Eyal Arazi, cloud security manager at Radware Eyal Arazi, cloud security manager at Radware, looks at why organizations once committed to cloud-first and cloud-only strategies are now reevaluating their […] The post Is 2024 the Year of Cloud Repatriation?…

Ai, Cybersecurity Awareness, And Communication

Moving beyond the hype, are AI cybersecurity solutions as advanced as they claim? By John Trest, Chief Learning Officer, VIPRE Security Group The emergence of numerous AI-driven cybersecurity products emphasizes […] The post Ai, Cybersecurity Awareness, And Communication appeared first…

Addressing Bias in Insider Risk Monitoring

By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […] The post Addressing Bias in Insider Risk Monitoring appeared…

AI: The Human Touch in Cybersecurity Recruitment

Harnessing the Digital Scout for Cybersecurity’s Future By Darrin Straff, Senior Staffing Consultant, NinjaJobs Introduction: In the digital age, where cybersecurity threats are ever-evolving, AI’s role in strengthening our defenses […] The post AI: The Human Touch in Cybersecurity Recruitment…

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to […] The post The Tech Jobs That AI Will Not…

3 New Risks That CISOs Will Face in 2024

By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere are increasingly vigilant about how their data is being gathered […] The post 3 New Risks That CISOs Will Face…

The Crumbling Castle

By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy involved building a strong perimeter around the corporate network, like […] The post The Crumbling Castle appeared first on Cyber…

Protecting Critical Infrastructure from Cyber Attack

The enemy is using cyber weapons that are hard to track and even harder to fully attribute to an adversary, companies need to act now By Richard Staynings, Chief Security […] The post Protecting Critical Infrastructure from Cyber Attack appeared…

Ditch the Worry – Switch to Secure WhatsApp Alternative

By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it has been designed as a personal and social messaging service. […] The post Ditch the Worry – Switch to Secure…

Protecting Your Business and Personal Data

By Brian Lonergan, VP of Product Strategy, Identity Digital October celebrated National Cybersecurity Awareness Month (NCSAM), a time when public and private sectors, along with tribal communities, join forces to […] The post Protecting Your Business and Personal Data appeared…

North Korea–Russia Summit

A new alliance in cyberspace? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction Last month, North Korean leader Kim Jong Un took a rare trip beyond his country’s borders – […] The post North Korea–Russia Summit appeared first on Cyber…

In Pursuit of a Passwordless Future

By Rob Jenks, Senior Vice President of Corporate Strategy, Tanium  Many computer users dream of a day when the industry can move past its reliance on passwords to reach a […] The post In Pursuit of a Passwordless Future appeared…

When the Enemy Is DDoS, Holistic Protection Is a Must

An infinite variety of attack methods require customizable solutions. By Sean Newman, VP/Product Management, Corero Sun Tzu was an exceptional general, strategist, and philosopher, and certainly one of the most […] The post When the Enemy Is DDoS, Holistic Protection…

Keeping SaaS Data Under Wraps

A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business of image and reputation don’t want to get bad publicity. […] The post Keeping SaaS Data Under Wraps appeared first…

Data Sanitization for End-Of-Use Assets

Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe are prioritizing Cybersecurity efforts as threats from cyber criminals are […] The post Data Sanitization for End-Of-Use Assets appeared first…

Common Pitfalls of Running On-Premises SIEM Solutions

By Vinaya Sheshadri, Practice Leader Cyber Security at RiverSafe A good SIEM tool is a necessity for any organisation looking to protect their digital environment. They help security teams be […] The post Common Pitfalls of Running On-Premises SIEM Solutions…

How To Combat the Mounting ‘Hacktivist’ Threat

By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less by money than ideology. These ‘hacktivists’ are actively targeting businesses […] The post How To Combat the Mounting ‘Hacktivist’ Threat…

Zombie APIs: The Scariest Threat Lurking in The Shadows?

By Dan Hopkins, VP of Engineering at StackHawk IT modernization and digital transformation initiatives, combined with faster software deployment lifecycles, has caused an exponential increase in the size and scale […] The post Zombie APIs: The Scariest Threat Lurking in…

An Age-by-Age Guide to Online Safety for Kids

By Chelsea Hopkins, Social Media Manager, Fasthosts The internet is a fast-changing world of information that allows kids to play, create, browse, and engage with different people from all corners […] The post An Age-by-Age Guide to Online Safety for…

Charting a Trustworthy AI Journey

Sound cybersecurity principles for responsible generative AI innovation By Lisa O’Connor, Managing Director—Accenture Security, Cybersecurity R&D, Accenture Labs As companies turn to generative AI to transform business operations, traditional notions […] The post Charting a Trustworthy AI Journey appeared first…

Understanding the Escalating Threat of Web DDoS Tsunami Attacks

By Uri Dorot, Senior Security Solutions Lead at Radware Whether it’s hacktivists conducting cyberwarfare or ransom-seeking criminals targeting vulnerable firms in financial services, retail, energy, or transportation, a new breed […] The post Understanding the Escalating Threat of Web DDoS…

The Evolving Landscape of Ransomware Attacks

2023 – What is new in the world of Ransomware By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Ransomware has been making headlines since 2021, and it continues to do […] The post The Evolving Landscape of Ransomware Attacks appeared…

Combatting Social Engineering – The Invisible Threat

By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology […] The post Combatting Social Engineering – The Invisible Threat…

Cyber Strategy Is Not a Synonym for Tech Stack

By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid. Losing can mean going out of business. The cars, marvels […] The post Cyber Strategy Is Not a Synonym for…

Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket

Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices have become indispensable companions in our daily lives, offering us […] The post Mobile Insecurity: Unmasking the Vulnerabilities in Your…

Beyond Mere Compliance

Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and sprinkler systems merely because their installation is required by local […] The post Beyond Mere Compliance appeared first on Cyber…