Keepnet specializes in addressing human factors of security through innovative security awareness training and phishing simulation tools. This article highlights the significant findings of their 2024 Vishing (Voice Phishing) Response… The post Innovator Spotlight: Keepnet Labs appeared first on Cyber…
Tag: Cyber Defense Magazine
The Ugly Truth about Your Software Vendor which CISOs Won’t Want (But Do Need) to Hear
We’ve got a hard truth to share with you, and you might not like it: You are not your software vendor’s top priority. Your vendor is focused on their own… The post The Ugly Truth about Your Software Vendor which…
Zero-Trust Endpoint Security
Zero-Trust Endpoint Security: How a Preventive Approach Can Limit Your Endpoint Attack Surface Endpoint security has become more critical than ever in today’s rapidly evolving threat landscape. As enterprises become… The post Zero-Trust Endpoint Security appeared first on Cyber Defense…
The Unsolvable Problem: XZ and Modern Infrastructure
The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst up at night. The recent XZ backdoor attack is finally… The post The Unsolvable Problem: XZ and Modern Infrastructure appeared…
Publishers Spotlight: Proofpoint
I was thrilled to catch up with Proofpoint top executives, recently, to discuss Proofpoint’s AI-powered solution and critical issues including data leakage and insider risks. In an era where digital… The post Publishers Spotlight: Proofpoint appeared first on Cyber Defense…
AI-Powered Fraud Detection Systems for Enhanced Cybersecurity
Artificial intelligence (AI) has many applications in cybersecurity. Automated fraud detection is one of the most impactful of these use cases. Fraud can be difficult for humans to spot, but… The post AI-Powered Fraud Detection Systems for Enhanced Cybersecurity appeared…
Strategies for Building an Effective, Resilient Security Operations Center
The modern Security Operations Center (SOC) has morphed and matured since its infancy in the early 1990s. The primary responsibility of monitoring for any indication of intrusion or compromise has… The post Strategies for Building an Effective, Resilient Security Operations…
The Identity Security Mirage: Unveiling the Hidden Risks in Your Digital Infrastructure
In today’s rapidly evolving digital landscape, organizations are increasingly reliant on complex networks of identities to power their operations. From human users to non-human accounts, such as service accounts, APIs,… The post The Identity Security Mirage: Unveiling the Hidden Risks…
70% of Enterprises Established SaaS Security Teams, Cloud Security Alliance Survey Finds
More than 70 percent of enterprises have prioritized SaaS security by establishing dedicated teams to secure SaaS applications, a trend identified for the first time in the fourth Annual SaaS Security… The post 70% of Enterprises Established SaaS Security Teams, Cloud…
Transforming Security Testing With AI: Benefits and Challenges
Security testing plays a critical role in ensuring that applications are protected against vulnerabilities and attacks. In times when cyber attacks like data breaches and ransomware are rising, security testing… The post Transforming Security Testing With AI: Benefits and Challenges…
RegreSSHion, Critical RCE Vulnerabilities, and When Should You Be Scared?
On July 1st, 2024, the cybersecurity community was rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in OpenSSH, aptly named regreSSHion. This revelation triggered a frenzy… The post RegreSSHion, Critical RCE Vulnerabilities, and When Should You…
NextGen Identity Management
Federal agencies face a pivotal cybersecurity challenge: prevent unauthorized entities from accessing systems and facilities, while granting authorized federal employees and contractors access commensurate with verified need. Two factors complicate… The post NextGen Identity Management appeared first on Cyber Defense…
Strengthening Security
Integrated Governance, Risk, and Compliance Is Critical Business executives in all sectors place a high premium on security in the quickly changing digital landscape of today. Security is no longer… The post Strengthening Security appeared first on Cyber Defense Magazine.…
Innovator Spotlight: Cyberseconomics
In today’s rapidly evolving digital landscape, fear, uncertainty, and doubt have become the dominant emotions for many organizations grappling with cybersecurity. The constant reports of data breaches, ransomware attacks, and… The post Innovator Spotlight: Cyberseconomics appeared first on Cyber Defense…
How AI-Driven Cybersecurity Offers Both Promise and Peril for Enterprises
Artificial Intelligence (AI) is transforming multiple sectors, driving innovation and enhancing productivity and cybersecurity. The AI market is projected to rise from an estimated $86.9 billion in revenue in 2022… The post How AI-Driven Cybersecurity Offers Both Promise and Peril…
Innovator Spotlight: Zendata
In today’s digital landscape, data security and privacy have become top priorities for organizations of all sizes. According to a 2023 report by IBM, the average cost of a data… The post Innovator Spotlight: Zendata appeared first on Cyber Defense…
Worried about Insider Risk? Pay More Attention to Offboarding
Discussions of insider risk inevitably conjure images of disgruntled IT employees stealing sensitive data from the comfort of an air-conditioned office. However, insider risk is significantly more complex, and any… The post Worried about Insider Risk? Pay More Attention to…
The Role of Intelligence in Cyber Threat Response
1) The Reality of Cybersecurity Threats and Response As technology develops and digitalization progresses, cybersecurity threats are becoming increasingly diverse and sophisticated. As a result, responding to these cybersecurity threats… The post The Role of Intelligence in Cyber Threat Response…
Innovator Spotlight: Concentric AI
It’s not enough for companies to just discover and monitor sensitive data. They need tools that can proactively fix any security issues to prevent data loss and meet compliance standards…. The post Innovator Spotlight: Concentric AI appeared first on Cyber…
How Automation Can Help Security Policy Optimization
One of the recurring questions we hear from network security leaders is “why aren’t our security policies optimized?” The answer, however, is far from simple. The truth is that a… The post How Automation Can Help Security Policy Optimization appeared…