When I go to BlackHat I’m always looking for cyber innovation across many vectors including cyber resilience artificial intelligence and most importantly compliance. This year I met up with Lalit… The post Publishers Spotlight: DigitalXForce appeared first on Cyber Defense…
Tag: Cyber Defense Magazine
Shedding Light on The Dark Web: Enhancing Cybersecurity Through Proactive Monitoring
In the digital age, the dark web has emerged as a clandestine marketplace for illicit activities, including the sale of stolen data, illegal software and various forms of malware. The proliferation of these marketplaces poses significant threats to personal, corporate and national security. As… The post Shedding Light on The Dark Web: Enhancing Cybersecurity…
Maximizing Cybersecurity Impact Within Budget Constraints
Cybersecurity is the cornerstone of organizational stability and resilience today. Despite its critical importance, budgetary allocations often fall short due to competing priorities. Mimecast recently surveyed 1,100 CISOs and information… The post Maximizing Cybersecurity Impact Within Budget Constraints appeared first…
The Undeniable but Often Overlooked Human Element of Cybersecurity
It is firmly established that there is no such thing as 100% security – in fact, a security breach is not a matter of ‘if’ but ‘when.’ In other words, risk will always exist, and businesses… The post The Undeniable but Often Overlooked Human Element of…
Transparency in Cybersecurity: The Importance of Accurate Vulnerability Disclosures
Recently, the cybersecurity world has been rattled by a series of critical vulnerabilities discovered in Ivanti Connect Secure VPN software. In the wake of these ongoing vulnerability issues, Ivanti has… The post Transparency in Cybersecurity: The Importance of Accurate Vulnerability…
Balancing the Scales: Addressing Privacy, Security, and Biases in AI based on the White House Blueprint for an AI Bill of Rights
Within the last few weeks, the major AI competitors OpenAI, Google, and Microsoft unveiled several new products and capabilities of their platforms. Perhaps, most notable was OpenAI’s ability to now… The post Balancing the Scales: Addressing Privacy, Security, and Biases…
The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter
I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My RSA 2024 started on Sunday, speaking with a group of… The post The Art of Possible: Redefining Cybersecurity in the…
Safeguarding The Backbone: The Critical Imperative to Protect Operational Technology (OT) Devices
Introduction Operational Technology (OT) devices, integral in controlling and monitoring industrial processes, have become prime targets for cyberattacks. Since late 2023, there has been a notable increase in attacks on… The post Safeguarding The Backbone: The Critical Imperative to Protect…
Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders
The Federal OT footprint – from military base operations to their public utilities, from postal operations to NASA missions – is immense, which means the potential cyber attack surface is… The post Who’s Minding the Store? Why Operational Technology Security…
The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth
Data security and consumer trust go hand-in-hand in our evolving digital world There’s no doubt that data is a catalyst of growth, forcing companies to increasingly rely on it to… The post The Value of Trust: How Companies Can Harness…
It Is Time for Smart Cyber Requirements for the Water Sector
Since 2021, the Biden Administration has been consistently talking about the limitations of a purely voluntary approach to cybersecurity for critical infrastructure, and the need for a strategic shift. Among… The post It Is Time for Smart Cyber Requirements for…
Looking Past DevOps: AI, ClickOps and Platform Engineering
About fifteen years ago, DevOps radically overhauled the world of software engineering. Previously, the development process had been defined by sometimes maddening delays, as development teams waited for operations teams… The post Looking Past DevOps: AI, ClickOps and Platform Engineering…
The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare
In an alarming revelation, Kaiser Foundation Health Plan reported a data breach impacting over 13 million individuals. For years, there has been an unspoken but critical vulnerability in the healthcare… The post The Kaiser Data Breach Should Be a Wake-Up…
How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert
It doesn’t take much to guess why cybercriminals increasingly target banking applications including emerging fintech and trading as their prime targets – cybercriminals have and continue to be largely financially-motivated…. The post How to Best Secure Banking Applications – Top…
Eliminating the Last Mile Between Security Data and Decision Making
Once upon a time, when we used to have to go to physical stores to get the products we needed, there was no such thing as the retail “last mile”… The post Eliminating the Last Mile Between Security Data and…
Mitigating Data Breaches with AI-Driven Security Solutions
SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes, even those equipped with robust security measures. As cybercriminals become… The post Mitigating Data Breaches with AI-Driven Security Solutions appeared…
The Dual Nature of Ransomware Attacks
Financial Gain and Geopolitical Strategy Ransomware attacks have evolved from mere cybercriminal activities to sophisticated operations serving dual purposes: financial gain for attackers and advancing the geopolitical objectives of adversarial… The post The Dual Nature of Ransomware Attacks appeared first…
The Other Lesson from the XZ Utils Supply-Chain Attack
“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in the case of the recent XZ Utils case, it was… The post The Other Lesson from the XZ Utils Supply-Chain…
Eliminating the Last Mile Between Security Data and Decision Making
Once upon a time, when we used to have to go to physical stores to get the products we needed, there was no such thing as the retail “last mile”… The post Eliminating the Last Mile Between Security Data and…
Artificial Intelligence in 2024
Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so far as to call it the “revolution of work.” Unfortunately,… The post Artificial Intelligence in 2024 appeared first on Cyber…