AI in Action: Real-World Breakthroughs and Innovations Attending the RSA Conference for the first time was an incredible experience! Ever since I began my journey in cybersecurity, attending the RSA… The post RSA Conference 2024 Highlights: Cutting-Edge Cybersecurity Innovations appeared…
Tag: Cyber Defense Magazine
The Scourge of Ransomware
Ransomware has become a growing threat in our new hybrid world. It encrypts a victim’s files, rendering them inaccessible, and demands a ransom payment for the decryption key. This can… The post The Scourge of Ransomware appeared first on Cyber…
Strengthening Cybersecurity – Transforming in the Age of Healthcare Digitalization
Healthcare and technology increasingly intersect in today’s world, and cybersecurity has become a primary concern for many companies. However, the recent attack on Change Healthcare serves as a harsh reminder… The post Strengthening Cybersecurity – Transforming in the Age of…
Is Your Organization a Laggard or a Leader in Digital Trust?
By Mike Fleck, Head of Product Marketing at DigiCert Digital trust is at the core of what makes internet connected experiences valuable. Whether we’re making an e-commerce purchase, signing a […] The post Is Your Organization a Laggard or a…
Comparing MDR vs SIEM: Which Is Better for Your Business?
By Vira Shynkaruk, Cybersecurity Content Expert, UnderDefense Making the right call on cybersecurity solutions is paramount for businesses, especially now, when they are constantly under siege from cyberattacks. The critical […] The post Comparing MDR vs SIEM: Which Is Better…
Rogue Nations: An Assessment of State-Sponsored Cyberattacks.
By Jacques de la Riviere, CEO, Gatewatcher Few prefixes excite the cybersecurity market as much as ‘state-sponsored.’ The label immediately conjures images of well-equipped, highly-resourced teams targeting high-profile organisations and […] The post Rogue Nations: An Assessment of State-Sponsored Cyberattacks.…
The AI Arms Race Shaping Federal Cyber Resilience
By Gary Barlet, Federal Chief Technology Officer, Illumio At its core, the paradox of artificial intelligence (AI) in cybersecurity lies in conflicting uses. On one hand, malicious actors harness AI […] The post The AI Arms Race Shaping Federal Cyber…
Get 10x more Visibility across APTs with Red Piranha’s SOC-as-a-Service and Crystal Eye
By Adam Bennett, CEO, Red Piranha Cyberattacks are on the rise and it’s crucial for organizations to have a reliable security system that can detect and respond to threats in […] The post Get 10x more Visibility across APTs with…
A National Imperative – Cyber Resiliency
Strategies to Safeguard Critical Infrastructure Against Cyber Threats By Andrea E. Davis, Founder and President of The Resiliency Initiative I started my career in emergency management in 1999. At the […] The post A National Imperative – Cyber Resiliency appeared…
How and When to Know You Need a Fractional CISO
By Andy Hilliard, CEO of Accelerance Every business owner knows how important cyber security is. Headlines of attacks, leaks and breaches of customer data, payment information, intellectual property and more […] The post How and When to Know You Need…
Understanding the Dark Web: What You Need to Know
Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top. […] The post Understanding the Dark Web: What You Need…
Special Cybersecurity Considerations for Medical and Legal Practices
“Protect The Most Vulnerable at Their Most Vulnerable Times” By Jim Ford, Founder and CEO, PatientLock® and JurisLock™ In the spring of 2018, my (then) pregnant wife and I went […] The post Special Cybersecurity Considerations for Medical and Legal…
How to Hunt for Volt Typhoon Malware in Critical Infrastructure
🚨🔍 Don’t miss out on the Hunt for Volt Typhoon event! 🌐💻 Join us to explore cutting-edge cyber tactics, innovative defense strategies, and the latest in threat detection. Perfect for […] The post How to Hunt for Volt Typhoon Malware…
Cybersecurity as a Service Market: A Domain of Innumerable Opportunities
Cybersecurity as a Service Market By Aashi Mishra, Content Writer, Research Nester The increased internet usage, all across the globe, is giving rise to cybercrime cases. Cybercrime is any unlawful […] The post Cybersecurity as a Service Market: A Domain…
How Improving EV Charging Infrastructure Can Bolster US Cybersecurity Measures
By Elaina Farnsworth, Co-founder & CEO — SkillFusion The surging popularity of electric vehicles (EVs) is marking a strong push toward overall sustainability for the United States. However, as EV […] The post How Improving EV Charging Infrastructure Can Bolster…
Navigating the Perilous Waters of Supply Chain Cybersecurity
By Kenneth Moras Introduction: In today’s interconnected business environment, reliance on innovative vendors and open source solutions is inevitable. However, these supply chains also stand on the frontline in the […] The post Navigating the Perilous Waters of Supply Chain…
The Challenge of Combatting Threats Against Autonomous Vehicles
By Joseph Hladik, Cyber Group Lead, Neya Systems From perception and sensing to mapping and localization, both off-road and on-road autonomous vehicles rely heavily on software and connectivity to operate […] The post The Challenge of Combatting Threats Against Autonomous…
Emerging Technology Review and Needs
By Milica D. Djekic The progress distribution is a slow and time-consuming process that normally might take decades and sometimes centuries in order to deliver a betterment for many to […] The post Emerging Technology Review and Needs appeared first…
Spotlight on Scribe Security
By Dan K. Anderson vCISO and On-Call Roving Reporter, Cyber Defense Magazine In my travels and works one of the most difficult challenges for Security is achieving good relations and […] The post Spotlight on Scribe Security appeared first on…
Combating Cyber-attacks with Threat-Intelligence
Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally […] The post Combating Cyber-attacks with Threat-Intelligence appeared first on…