The volume of code needed is greater than ever while cycles to produce said code are shrinking. One of the consequences of this is security has become secondary – both… The post Innovator Spotlight: Qwiet appeared first on Cyber Defense…
Tag: Cyber Defense Magazine
Innovator Spotlight: ZINAD
In today’s fast-evolving digital landscape, cyber attackers are becoming increasingly creative, targeting the human element as a primary entry point. Research shows that human error accounts for up to 90%… The post Innovator Spotlight: ZINAD appeared first on Cyber Defense…
One Year Later: CISA’s Secure by Design Initiative
In April 2023, the Cybersecurity and Infrastructure Security Agency (CISA) unveiled the Secure by Design initiative, setting a new standard for security across the industry. The initiative urges vendors to create… The post One Year Later: CISA’s Secure by Design Initiative…
Innovator Spotlight: HyperCube
by Pete Green, vCISO, Cybersecurity Consultant and Reporter for CDM Gartner has stated the challenge facing most organizations today: “Boards are now pushing back for improved understanding of what they… The post Innovator Spotlight: HyperCube appeared first on Cyber Defense…
Publishers Spotlight: HackerOne
I was thrilled to catch up with HackerOne during Black Hat USA 2024. The modern threat landscape presents increasingly complex cybersecurity challenges for modern organizations. Emerging technologies, like generative AI,… The post Publishers Spotlight: HackerOne appeared first on Cyber Defense…
The Great Ai Swindle
AI washing, or making inflated or misleading claims about AI capabilities, is nothing new. In some ways it is to be expected when a new disruptive technology hits the limelight…. The post The Great Ai Swindle appeared first on Cyber…
Modernizing and Applying FedRAMP Security Standards to Accelerate Safe AI
Often, technology develops faster than we can handle. This is especially true for the federal government and its partners — organizations that must adhere to strict security standards in the… The post Modernizing and Applying FedRAMP Security Standards to Accelerate…
From Burnout to Balance: How AI Supports Cybersecurity Professionals
As technology advances, cyber threats are becoming more complex and harder to combat. According to Cobalt’s State of Pentesting Report, this past year, the number of security vulnerabilities increased by 21%,… The post From Burnout to Balance: How AI Supports Cybersecurity…
Getting Out in Front of Post-Quantum Threats with Crypto Agility
Ready or not, quantum computing technology is rapidly advancing, and its new capabilities will be available sooner than most think. Quantum technology has the potential to transform applications like materials… The post Getting Out in Front of Post-Quantum Threats with…
The Perils of Settling: Why ‘Good Enough’ Fails in Modern Cybersecurity
Introduction: In an era where digital innovation advances rapidly and cyber threats evolve just as quickly, it is crucial for organizations to reassess their security strategies. There is a growing… The post The Perils of Settling: Why ‘Good Enough’ Fails…
Top Tips and Risks Ahead of the 2024 Olympic Games
As buzz and excitement continues to build around the upcoming 2024 Summer Olympics, it is important to be aware of the potential cyberthreats that often target such large global events. The… The post Top Tips and Risks Ahead of the 2024…
Protecting Against Malicious Open Source Packages
What Works and What Doesn’t A software package is the dream of reusability made possible. Individual developers and organizations of all kinds contributed software components to public repositories, in standardized… The post Protecting Against Malicious Open Source Packages appeared first…
Unlocking Secure Communications 101: The Fundamentals
Ensuring the protection of data and communications is of utmost importance for organisations adapting to the intricacies of the digital era. Are you knowledgeable about secure communications? Whether you’re new… The post Unlocking Secure Communications 101: The Fundamentals appeared first…
Fortifying The Digital Frontier: Everyday Habits That Shape Your Company’s Cybersecurity Posture
The importance of internet safety has never been more pronounced than in today’s digital age, where the boundaries between our personal and professional lives are increasingly blurred. However, with this… The post Fortifying The Digital Frontier: Everyday Habits That Shape…
Innovator Spotlight: Cymulate
AI Copilot: Revolutionizing Threat Exposure Validation by Samridhi Agarwal, Master’s Student, CMU During BlackHat, Cymulate, a leader in security and exposure validation, has officially launched Cymulate AI Copilot, an innovative,… The post Innovator Spotlight: Cymulate appeared first on Cyber Defense…
Innovator Spotlight: Illumio
Pioneering Zero Trust Segmentation for Comprehensive Cybersecurity by Samridhi Agarwal, Master’s Student, CMU In today’s rapidly evolving cybersecurity landscape, organizations face increasingly sophisticated threats that can breach even the most… The post Innovator Spotlight: Illumio appeared first on Cyber Defense…
Innovator Spotlight: Fortanix
Unveiling Secure Data Practices in a World of AI Risks by Samridhi Agarwal, Master’s Student, CMU In an era where artificial intelligence is becoming increasingly prevalent, organizations face new and… The post Innovator Spotlight: Fortanix appeared first on Cyber Defense…
Tips for Detecting and Preventing Multi-Channel Impersonation Attacks
Recently, the CEO of the world’s biggest advertising group, Mark Read, was the target of a deepfake scam using an AI-based voice clone. Read disclosed that scammers used a publicly available photo… The post Tips for Detecting and Preventing Multi-Channel Impersonation Attacks…
Innovator Spotlight: Expel
Leading the Charge in Managed Detection and Response by Samridhi Agarwal, Master’s Student, CMU In a conversation with Greg Notch, CISO at Expel, explored the increasing sophistication of cyber threats,… The post Innovator Spotlight: Expel appeared first on Cyber Defense…
Spotlight on Oleria
Q&A with OIeria CEO Jim Alkove: Identity is the keystone to the future of cybersecurity and a critical area for companies to focus on because it’s where attackers are moving…. The post Spotlight on Oleria appeared first on Cyber Defense…