Tag: Cyber Defense Magazine

Innovator Spotlight: Keepnet Labs

Keepnet specializes in addressing human factors of security through innovative security awareness training and phishing simulation tools. This article highlights the significant findings of their 2024 Vishing (Voice Phishing) Response… The post Innovator Spotlight: Keepnet Labs appeared first on Cyber…

Zero-Trust Endpoint Security

Zero-Trust Endpoint Security: How a Preventive Approach Can Limit Your Endpoint Attack Surface Endpoint security has become more critical than ever in today’s rapidly evolving threat landscape. As enterprises become… The post Zero-Trust Endpoint Security appeared first on Cyber Defense…

The Unsolvable Problem: XZ and Modern Infrastructure

The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst up at night. The recent XZ backdoor attack is finally… The post The Unsolvable Problem: XZ and Modern Infrastructure appeared…

Publishers Spotlight: Proofpoint

I was thrilled to catch up with Proofpoint top executives, recently, to discuss Proofpoint’s AI-powered solution and critical issues including data leakage and insider risks. In an era where digital… The post Publishers Spotlight: Proofpoint appeared first on Cyber Defense…

AI-Powered Fraud Detection Systems for Enhanced Cybersecurity

Artificial intelligence (AI) has many applications in cybersecurity. Automated fraud detection is one of the most impactful of these use cases. Fraud can be difficult for humans to spot, but… The post AI-Powered Fraud Detection Systems for Enhanced Cybersecurity appeared…

Transforming Security Testing With AI: Benefits and Challenges

Security testing plays a critical role in ensuring that applications are protected against vulnerabilities and attacks. In times when cyber attacks like data breaches and ransomware are rising, security testing… The post Transforming Security Testing With AI: Benefits and Challenges…

NextGen Identity Management

Federal agencies face a pivotal cybersecurity challenge: prevent unauthorized entities from accessing systems and facilities, while granting authorized federal employees and contractors access commensurate with verified need. Two factors complicate… The post NextGen Identity Management appeared first on Cyber Defense…

Strengthening Security

Integrated Governance, Risk, and Compliance Is Critical Business executives in all sectors place a high premium on security in the quickly changing digital landscape of today. Security is no longer… The post Strengthening Security appeared first on Cyber Defense Magazine.…

Innovator Spotlight: Cyberseconomics

In today’s rapidly evolving digital landscape, fear, uncertainty, and doubt have become the dominant emotions for many organizations grappling with cybersecurity. The constant reports of data breaches, ransomware attacks, and… The post Innovator Spotlight: Cyberseconomics appeared first on Cyber Defense…

Innovator Spotlight: Zendata

In today’s digital landscape, data security and privacy have become top priorities for organizations of all sizes. According to a 2023 report by IBM, the average cost of a data… The post Innovator Spotlight: Zendata appeared first on Cyber Defense…

Worried about Insider Risk? Pay More Attention to Offboarding

Discussions of insider risk inevitably conjure images of disgruntled IT employees stealing sensitive data from the comfort of an air-conditioned office. However, insider risk is significantly more complex, and any… The post Worried about Insider Risk? Pay More Attention to…

The Role of Intelligence in Cyber Threat Response

1) The Reality of Cybersecurity Threats and Response As technology develops and digitalization progresses, cybersecurity threats are becoming increasingly diverse and sophisticated. As a result, responding to these cybersecurity threats… The post The Role of Intelligence in Cyber Threat Response…

Innovator Spotlight: Concentric AI

It’s not enough for companies to just discover and monitor sensitive data. They need tools that can proactively fix any security issues to prevent data loss and meet compliance standards…. The post Innovator Spotlight: Concentric AI appeared first on Cyber…

How Automation Can Help Security Policy Optimization

One of the recurring questions we hear from network security leaders is “why aren’t our security policies optimized?” The answer, however, is far from simple. The truth is that a… The post How Automation Can Help Security Policy Optimization appeared…