Tag: Cyber Defense Magazine

The Persistent Danger of Remcos RAT

By Dilpreet Singh Bajwa, Senior Consultant, Cyfirma Executive Summary At Cyfirma, we are dedicated to providing you with up-to-date information on the most prevalent threats and tactics used by malicious […] The post The Persistent Danger of Remcos RAT appeared…

Forging A New Era of Invoicing Security

How blockchain-powered software is preventing cyber attacks By Ramon AB, CEO and Co-Founder of Nova Technology Invoicing may not be the first thing that pops up in a conversation around […] The post Forging A New Era of Invoicing Security…

Digital Criminal Ontology; Trading Pistols for Programmers

By James Allman Talbot, Head of Incident Response & Threat Intelligence, Quorum Cyber Since computers were first connected with Ethernet cables, Hollywood started romanticizing hackers. In 1983, WarGames was released. […] The post Digital Criminal Ontology; Trading Pistols for Programmers…

AI in Cybersecurity

Separating Hype from Hyperbole By Avkash Kathiriya “Artificial Intelligence in cybersecurity is like a supercharged virtual fortress armed with a gazillion laser-focused cyber warriors, ready to annihilate any threat with […] The post AI in Cybersecurity appeared first on Cyber…

Cybersecurity Is Changing: Is the Experience Positive or Negative?

By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies Cybersecurity is Changing: Is the Experience Positive or Negative? Unfortunately, cybersecurity and cybercrime represent the age-old Hollywood trope famously […] The post Cybersecurity Is Changing: Is the Experience Positive…

The Rising Tide of Cybercrime as A Service (CaaS)

By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which, quite alarmingly, is like an online marketplace for cybercriminals and […] The post The Rising Tide of Cybercrime as A…

The Embedded Systems and The Internet of Things

By Milica D. Djekic The Internet of Things (IoT) is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This […] The post The Embedded Systems and The Internet of…

Halting Hackers on the Holidays 2023

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive […] The post Halting Hackers on the Holidays 2023 appeared…

IT Modernization Efforts Need to Prioritize Cybersecurity

By Mark Marron, CEO and President, ePlus, Inc. Organizations are increasingly advancing their digital transformation efforts to deliver internal efficiencies, reduce costs, and improve customer experiences. As a side-effect of […] The post IT Modernization Efforts Need to Prioritize Cybersecurity…

How to Avoid Common Security Incidents in the Public Cloud

By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the global spending on public cloud services was around $490.3 billion […] The post How to Avoid Common Security Incidents in…

E-mail Compromise

How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of the most beloved cybercriminals’ method for compromise of organization’s data. […] The post E-mail Compromise appeared first on Cyber Defense…

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…

There Are Cyberheroes: THE VIGILANCE MANIFESTO

A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI In the vast expanse of the digital realm, where shadows […] The post There Are Cyberheroes: THE VIGILANCE MANIFESTO appeared…

Who are the Wagner PMCs of Russia

Is There a Risk of Cyber Fallout? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Executive Summary At the end of June, a Russian mercenary organization known as ‘Wagner’ has mutinied […] The post Who are the Wagner PMCs of Russia…

Quantum Security is National Security

By Andy Manoske, Principal Product Manager of Cryptography and Security Products at HashiCorp Quantum computers will be one of the defining frontiers in computing over the next century. Utilizing the […] The post Quantum Security is National Security appeared first…

A New Ai Arms Race

By Alex Fink, CEO of the Otherweb The internet has seen its share of arms races in recent decades. The advent of viruses resulted in an ongoing battle between those […] The post A New Ai Arms Race appeared first…

6 Steps to Accelerate Cybersecurity Incident Response

Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must […] The post 6 Steps to Accelerate Cybersecurity Incident Response…

8 Tips for Best Results in Red-Teaming

By Zac Amos, Features Editor, ReHack In cybersecurity, a red team exercise is a unique way to ensure businesses can respond to cyberattacks appropriately. While it’s generally beneficial, taking extra […] The post 8 Tips for Best Results in Red-Teaming…

Simplifying your Approach to the Zero Trust Journey

By Chris Cullerot, Director of Technology and Innovation, iTech AG Earlier this year, the Cybersecurity and Infrastructure Security Agency released its Zero Trust Maturity Model 2.0 to help agencies develop […] The post Simplifying your Approach to the Zero Trust…

Digital Accessibility and Cybersecurity Must Go Hand in Hand

By Dr. Chris Olson In an Increasingly Digital World, Accessibility and Cybersecurity Have Emerged as Significant Factors for Both Individuals and Organizations. Digital accessibility refers to the design and development […] The post Digital Accessibility and Cybersecurity Must Go Hand…

Six Tips to Ensure a Strong Patch Management Strategy

By Ashley Leonard, CEO and Founder, Syxsense The proliferation of software applications and updates across the market today has put pressure on enterprise security teams to implement strong patch management […] The post Six Tips to Ensure a Strong Patch…

Publishers Spotlight: Nisos: Your Managed Intelligence Partner

Nisos is the Managed Intelligence™ team you need to consider working with to solve your most complex security challenges. They deliver smarter defense and more effective responses against advanced cyber […] The post Publishers Spotlight: Nisos: Your Managed Intelligence Partner…

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the […] The post How to interpret the 2023 MITRE ATT&CK…

Publisher’s Spotlight: F5: Multi-Cloud Security and Application Delivery

F5 is a multi-cloud application services and security company committed to bringing a better digital world to life.​​​​​​​ F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations […] The post Publisher’s Spotlight: F5: Multi-Cloud Security and Application…

Has MFA Had Its Day?

By Ori Arbel, CTO, CYREBRO Multi-factor authentication (MFA) has become the authentication standard for nearly all types of businesses – from banks to bicycle rentals and everything in between. Yet, […] The post Has MFA Had Its Day? appeared first…

From AI-driven Defense to Dark Web Threat Intelligence

How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […] The post From AI-driven Defense to Dark Web Threat…

Cyber: Dealing with a Data Breach

Data breaches are one of the most significant cyber threats organizations face, but when they occur, many businesses do not respond in a manner that reassures their clients or the […] The post Cyber: Dealing with a Data Breach appeared…

AI In Cybersecurity – Risks and Rewards

By Aimei Wei, Co-Founder and CTO, Stellar Cyber The global cybersecurity workforce grew to a record 4.7 million people in 2022, according to an (ISC)2 2022 workforce study, but the  same […] The post AI In Cybersecurity – Risks and Rewards…

The Best of Both Worlds Made Possible with A Hybrid SOC

By Chase Richardson, Principal Lead Consultant, Bridewell The revolving door of cyber-attacks on major organizations continues to turn. Among the most significant of breaches over the last year was a […] The post The Best of Both Worlds Made Possible…

The Role of AI in Cybersecurity

By Alysia Silberg, CEO, Street Global As technology increasingly connects us, people, businesses, and governments are more concerned with Cybersecurity than ever before. The development of Artificial Intelligence (AI) provides […] The post The Role of AI in Cybersecurity appeared…

Publisher’s Spotlight: Security Journey: Secure Coding Training

Security Journey is a secure coding education provider that is focused on addressing the evolving landscape of cybersecurity threats with comprehensive and engaging training. As security awareness has become a […] The post Publisher’s Spotlight: Security Journey: Secure Coding Training…

Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection

CrowdSec is a modern, collaborative cybersecurity company committed to proactively safeguarding digital assets. With a growing community of 65,000+ active installations contributing to a robust, constantly-updated global IP reputation database […] The post Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection…

The Other Russian War – What Can We Do?

Russian hacking efforts have highlighted weaknesses in U.S. cybersecurity infrastructure. By Jamie Eiseman, George Washington University Russia is invading Ukraine, and Russian hackers are attacking the United States. In October, […] The post The Other Russian War – What Can…

Publisher’s Spotlight: Cigent: Make Your Data Invisible

Cigent Technologies is a data security company that is renowned for their data protection  capabilities. They’ve had a long-standing relationship with the U.S. government and have been a trusted resource […] The post Publisher’s Spotlight: Cigent: Make Your Data Invisible…

Our Risk Perception Is Broken How Do We Fix It?

By Miguel Clarke, GRC and Cybersecurity Lead at Armor and former FBI Special Agent I was first introduced to the concept of cyber security in 2000.  Back then, the Dallas […] The post Our Risk Perception Is Broken How Do…