The cybersecurity landscape has seen a substantial threat vector transformation. While malware and ransomware continue to be relevant threats, a more nuanced class of attacks has gained traction. Over 80%… The post Countering The Adaptive Playbook of Modern Threat Actors…
Tag: Cyber Defense Magazine
Strengthening Cybersecurity in Healthcare: Protecting Patient Data and Ensuring Regulatory Compliance in a Digital Age
Cybersecurity in Healthcare As healthcare increasingly relies on digital technologies, the urgency for robust cybersecurity measures has never been more pronounced. This industry tackles challenges including the security of patient… The post Strengthening Cybersecurity in Healthcare: Protecting Patient Data and…
Why “Time to Patch” Is the Cybersecurity KPI That Matters Most
The way your organization manages its risk tolerance and regulatory factors are key performance indicators (KPIs) for assessing your cybersecurity posture. The most critical KPI is the specific time duration… The post Why “Time to Patch” Is the Cybersecurity KPI…
Top Recommendations for Data Retention and Deletion
The tremendous value that data holds for organizations also comes with the responsibility to properly address its storage, governance, and security. How can businesses tackle this significant task? This article… The post Top Recommendations for Data Retention and Deletion appeared…
How the U.S. Can Strengthen Its Cyber Defenses Against Nation-State Threats
The American power grid is not just the backbone of modern life. It’s a high-value target in our new era of geopolitical conflict. As foreign adversaries expand their cyber capabilities,… The post How the U.S. Can Strengthen Its Cyber Defenses…
Beyond Tick Boxes: An Auditor’s Perspective on Information Security Compliance
Introduction As cyber threats evolve and regulatory requirements tighten, businesses face increasing pressure to protect their sensitive data and strengthen security practices. This blog will give you some helpful insights… The post Beyond Tick Boxes: An Auditor’s Perspective on Information…
Why Outdated Corporate Networks Are Analogous to the Aging U.S. Highway System
“Necessity is the mother of invention” has never been more fitting—whether you’re talking about America’s post-WWII highway boom or the evolution of enterprise networks during the internet revolution. The U.S…. The post Why Outdated Corporate Networks Are Analogous to the…
Mapping a Future without Cyber Attacks
After countless attacks across a multitude of organizations, the cyber security industry has a fairly good grasp of how adversaries work, the vulnerabilities they take advantage of, and of course,… The post Mapping a Future without Cyber Attacks appeared first…
Deepfakes at the Gate: How Fake Job Applicants Are Becoming a Serious Cyber Threat
In recent months, the hiring process has become a new attack surface. Cybercriminals are no longer just spoofing emails or exploiting software flaws—they’re applying for jobs. In the last year,… The post Deepfakes at the Gate: How Fake Job Applicants…
Protecting CISOs and CSOs in an Era of Personal Liability
Chief Information Security Officers (CISOs) and Chief Security Officers (CSOs) face unprecedented pressures, not only from the evolving threat landscape but also from a legal environment that increasingly seeks to… The post Protecting CISOs and CSOs in an Era of…
Innovator Spotlight: Black Kite
The Invisible Threat: Reimagining Third-Party Risk Management Cybersecurity leaders are drowning in questionnaires while threat actors are swimming in data. The traditional approach to vendor risk management is broken, and… The post Innovator Spotlight: Black Kite appeared first on Cyber…
Expert Spotlight: Koushik Anand on IAM and PAM Excellence at Enterprise Scale
By Gary Miliefsky, Publisher With more than 80% of breaches involving stolen or misused credentials, identity is the control point that matters most. Koushik Anand helps enterprises secure digital identities… The post Expert Spotlight: Koushik Anand on IAM and PAM…
Innovator Spotlight: WitnessAI
WitnessAI Delivers Security for the AI Era In the AI era, innovation is moving fast. Unfortunately, this means that the risks associated with this movement are too. Malicious activities like… The post Innovator Spotlight: WitnessAI appeared first on Cyber Defense…
Innovator Spotlight: LastPass
LastPass Evolves Secure Access Experiences to Combat Shadow IT and AI Risks for CISOs Picture your organization humming along, with teams adopting new apps to boost efficiency. But beneath that… The post Innovator Spotlight: LastPass appeared first on Cyber Defense…
Bridging the Cybersecurity Talent Gap
There’s no doubt about it. Cybersecurity incidents are rising. In 2024, the FBI reported a 9% increase in ransomware complaints targeting critical U.S. infrastructure sectors, such as healthcare, manufacturing and government facilities…. The post Bridging the Cybersecurity Talent Gap appeared first on…
Digital Transformation Failures: A National Security Crisis in the Making
In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business and defense organizations alike, the ability to leverage the power of digital technologies… The post Digital Transformation Failures: A National Security Crisis in…
Securing Linux Systems in the Age of AI: Unified Security Strategies for Modern Enterprises
Introduction In the rapidly evolving landscape of cybersecurity, the integration of Artificial Intelligence (AI) has emerged as a transformative advancement. This is particularly true in the realm of Linux-based systems,… The post Securing Linux Systems in the Age of AI:…
Preparing for the EU’s DORA amidst Technical Controls Ambiguity
The financial sector is bracing for a significant shift in its digital landscape as the EU’s Digital Operational Resilience Act (DORA) prepares to take effect in January 2025. This new… The post Preparing for the EU’s DORA amidst Technical Controls…
Beyond Buzzwords: The Real Impact of AI on Identity Security
Artificial intelligence (AI) has become one of the most discussed technologies in recent years, often touted as the answer to many of today’s pressing challenges. In the cybersecurity space, especially… The post Beyond Buzzwords: The Real Impact of AI on…
Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets
Digital media created more opportunities for companies to engage with consumers than ever before, but such increased interconnectedness has a price. Attacks are becoming progressively advanced, targeting not only a… The post Beyond the Firewall: Protecting Your Marketing Department from…