It is a tale almost as old as time: users click download, install, and accept as they adopt new software applications without considering the security implications, or getting approval from… The post Unmasking Shadow Apps to Secure Your SaaS Stack…
Tag: Cyber Defense Magazine
Beyond Fines: The Real Value of Achieving Cybersecurity Compliance
Achieving cybersecurity compliance is often seen as a regulatory necessity, primary to avoid hefty fines and legal repercussions. However, the true value of compliance extends far beyond financial penalties. It… The post Beyond Fines: The Real Value of Achieving Cybersecurity…
It’s Time to Sound the Alarm on SMB Cyber Threats
There’s an unnerving secret many of us in cybersecurity have noticed. And if you think your company is “too small” to be worried about a potential attack, think again. As… The post It’s Time to Sound the Alarm on SMB…
Escalating Cyberattacks in the Healthcare Sector
The healthcare sector has become a prime target for cyberattacks, with the frequency and sophistication of these attacks increasing rapidly over the last several months. More than 124 million records were compromised… The post Escalating Cyberattacks in the Healthcare Sector appeared first…
SEC Cybersecurity Disclosure Rules – Are CISOs Ready to Go Beyond the Tip of the Iceberg?
It’s been more than six months since the SEC’s updated Cybersecurity Disclosure rules came into force. These rules represent a sea change for CISOs; both in terms of the burden… The post SEC Cybersecurity Disclosure Rules – Are CISOs Ready…
The First 10 Days of a vCISO’S Journey with a New Client
“In a quaint village nestled between rolling hills and dense forests, a young apprentice named Eli was learning to throw pottery from a master potter. On the first day by… The post The First 10 Days of a vCISO’S Journey…
Lockin Company’s Approach to Zero Trust Security and Rising Phishing Threats with its security software LIAPP, LIKEY, and LISS
LIAPP (Lockin App Protector) is an integrated mobile app security service developed by Lockin Company, a Korean-based security company dedicated to mobile apps protection, that protects over 2,000 apps worldwide…. The post Lockin Company’s Approach to Zero Trust Security and…
The Next Iteration of Privacy: What Businesses Should Know About New Privacy Laws in Oregon, Texas, and Florida
As businesses enter the third quarter of 2024, they need to contend with three new state privacy laws. The Texas Data Privacy and Security Act, Oregon Consumer Privacy Act, and… The post The Next Iteration of Privacy: What Businesses Should…
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help
On July 3rd the period for public comment closed for the U.S. Cybersecurity and Infrastructure Security Agency’s proposed Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) reporting rules… The post What CIRCIA Means for Critical Infrastructure Providers and…
Cybersecurity In Critical Infrastructure: Protecting Power Grids and Smart Grids
Infrastructure like water system, supply system, telecommunication networks, and power plants are critical assets for any country in that the destruction and incapacity of such systems poses an adverse effect… The post Cybersecurity In Critical Infrastructure: Protecting Power Grids and…
From Burnout to Balance: How AI Supports Cybersecurity Professionals
As technology advances, cyber threats are becoming more complex and harder to combat. According to Cobalt’s State of Pentesting Report, this past year, the number of security vulnerabilities increased by 21%,… The post From Burnout to Balance: How AI Supports Cybersecurity…
Getting Out in Front of Post-Quantum Threats with Crypto Agility
Ready or not, quantum computing technology is rapidly advancing, and its new capabilities will be available sooner than most think. Quantum technology has the potential to transform applications like materials… The post Getting Out in Front of Post-Quantum Threats with…
Innovator Spotlight: Zilla Security
by Dan K. Anderson CEO, CISO, and vCISO As organizations grow, managing access to critical systems and ensuring compliance with identity governance and administration (IGA) standards becomes increasingly complex. A… The post Innovator Spotlight: Zilla Security appeared first on Cyber…
Innovator Spotlight: Guardio
Cyber threats are becoming more sophisticated, putting both individuals and businesses at significant risk. The rise in phishing attacks, identity theft, and online fraud highlights the urgent need for accessible… The post Innovator Spotlight: Guardio appeared first on Cyber Defense…
Top Tips and Risks Ahead of the 2024 Olympic Games
As buzz and excitement continues to build around the upcoming 2024 Summer Olympics, it is important to be aware of the potential cyberthreats that often target such large global events. The… The post Top Tips and Risks Ahead of the 2024…
The MDR That Sees It All
Unmonitored infrastructure is a major source of initial compromises for enterprises. The Critical Start MDR solution counters this with endpoint coverage gap monitoring, log ingestion failure alerts, and hidden asset… The post The MDR That Sees It All appeared first…
Fortifying The Digital Frontier: Everyday Habits That Shape Your Company’s Cybersecurity Posture
The importance of internet safety has never been more pronounced than in today’s digital age, where the boundaries between our personal and professional lives are increasingly blurred. However, with this… The post Fortifying The Digital Frontier: Everyday Habits That Shape…
How SMBs Can Implement Cyber-HDR for Increased Protection and Reduced Risk Harden-Detect-Respond
Implementing Cyber-HDR for SMBs: Enhancing Protection and Reducing Risk In today’s digital landscape, small and medium-sized businesses (SMBs) face increasing threats from cyber espionage and cybercrime. With 46% of SMBs… The post How SMBs Can Implement Cyber-HDR for Increased Protection…
Spotlight on DeepKeep.ai
DeepKeep, the leading provider of AI-Native Trust, Risk, and Security Management (TRiSM), empowers large corporations that rely on AI, GenAI, and LLM technologies to manage risk and protect growth. Our… The post Spotlight on DeepKeep.ai appeared first on Cyber Defense…
Publisher’s Spotlight: Reach Security
The AI-Driven Solution Transforming Cybersecurity Infrastructure by Gary Miliefsky Publisher and Dan K. Anderson vCISO and Writer Reach Security is revolutionizing cybersecurity by introducing the first AI specifically designed to… The post Publisher’s Spotlight: Reach Security appeared first on Cyber…