By Theresa Le, Chief Claims Officer, Cowbell As cyber threats escalate and evolve worldwide, businesses must ensure their foundations are solid to withstand potential cyber incidents. Developing organizational resilience involves […] The post Becoming Resilient to The Cyber Incidents of…
Tag: Cyber Defense Magazine
Anatomy Of an Endpoint Attack: How A Cyberattack Can Compromise an Enterprise Network
By Guillermo Gomez, Vice President of Endpoint Product, WatchGuard Technologies For truly effective network security posture, it’s crucial to protect all of your company’s devices as cyber adversaries can turn […] The post Anatomy Of an Endpoint Attack: How A…
The Critical Role of Training and Phishing Testing in Safeguarding Financial Data
Empowering the Human Firewall: The Bedrock of Cyber Defense By Michael Cocanower, CEO, AdviserCyber The Evolving Cybersecurity Landscape for RIAs and Professionals For Registered Investment Advisers (RIAs) and cybersecurity professionals […] The post The Critical Role of Training and Phishing…
A Transformative Landscape in Legal Technology: From the Past to AI-Powered Future
By Rob Scott, Chief Innovator – Monjur The modern digital era, ripe with unparalleled technological evolutions, is remolding our perceptions and expectations at a pace once thought inconceivable. Among all […] The post A Transformative Landscape in Legal Technology: From…
6 Factors to Consider When Choosing a SIEM Solution
Don’t Settle for Less | Make an Informed Decision By Krunal Mendapara, Chief Technology Officer, Sattrix Group In today’s world, cyber threats are more rampant than ever before. It’s no […] The post 6 Factors to Consider When Choosing a…
2024: The Year of Secure Design
By Stephen de Vries, CEO, IriusRisk In 2023, we saw governments and global cybersecurity agencies begin to put the building blocks in place for secure design and take cyber defense […] The post 2024: The Year of Secure Design appeared…
Fortifying Digital Health Against Cyber Attacks
By Nissim Ben-Saadon, Director of Innovation, CYREBRO In today’s digital era, the healthcare industry stands at the forefront of technological adoption, heavily relying on digital systems such as Electronic Health […] The post Fortifying Digital Health Against Cyber Attacks appeared…
Strengthening Cyber Defense with Threat Intelligence Operations
By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to […] The post Strengthening Cyber Defense with Threat Intelligence Operations…
A Consolidated Approach to Fraud: Bringing Together Risk Insights, Organizations and Technology
By Kimberly Sutherland, vice president, fraud and identity strategy, LexisNexis® Risk Solutions Digital fraud has seen a substantial increase in recent years, mainly due to the sharp rise in digital […] The post A Consolidated Approach to Fraud: Bringing Together…
Cybersecurity or Cyber Resilience: Which Matters More?
Planning Beyond an Enterprise Security Posture and Toward Reliable Business Continuity By Amanda Satterwhite, Managing Director of Cyber Growth & Strategy, Accenture Federal Services Cybercrimes in the United States have […] The post Cybersecurity or Cyber Resilience: Which Matters More?…
Unlocking the Power of Governance in Cybersecurity: NIST CSF 2.0 Introduces ‘Govern’ to Redefine CISO Leadership in 2024
By Shirley Salzman, CEO and Co-Founder, SeeMetrics As all eyes are towards the updated NIST CSF 2.0 publication, some of the spoilers have already been published – now security leaders […] The post Unlocking the Power of Governance in Cybersecurity:…
Will We Ever See Federal Data Breaches End Entirely?
Government cybersecurity may get worse before it gets better. By April Miller, Managing Editor, ReHack Magazine Data breaches are a problem in virtually every industry. However, they carry extra weight […] The post Will We Ever See Federal Data Breaches…
Why Is Hardware More Secure than Software?
The underlying differences between hardware and software when implementing critical cryptosystems. By Kimmo Järvinen, Co-founder and CTO, Xiphera The majority of today’s cryptographic implementations rely on software running on general-purpose […] The post Why Is Hardware More Secure than Software?…
Three Rules of Crisis Management: Lessons from the War in Israel
Crises and challenges are a staple of the technology and cybersecurity industries. While we do our best to plan for growth, setbacks, and business resilience, some crises can’t be anticipated. […] The post Three Rules of Crisis Management: Lessons from…
Rise of the Cyber Supervillain
By Guy Rosefelt, Chief Product Officer, Sangfor Technologies In my Cyber HotSeat Interview with Gary Miliefsky, I made a prediction about the rise of the Cyber Supervillain. This is an […] The post Rise of the Cyber Supervillain appeared first…
Cyber resilience: Safeguarding your enterprise in a rapidly changing world
By Srinivasan CR, Executive Vice President-Cloud and Cybersecurity Services & Chief Digital Officer, Tata Communications In a hyperconnected world, cyberattacks are increasingly common. Just ransomware activity alone was up 50% […] The post Cyber resilience: Safeguarding your enterprise in a…
The Next Generation of Endpoint Security Is Being Reimagined Today
By Vivek Ramachandran, CEO & Founder, SquareX Gone are the days when traditional antivirus solutions were the bulwark of endpoint security. In the past, these antivirus programs were largely sufficient, […] The post The Next Generation of Endpoint Security Is…
The Importance of Data Categorization In A Threat-Filled Landscape
By Dr. Pragyansmita Nayak, Chief Data Scientist, Hitachi Vantara Federal National security is amid a transformative journey driven by technological progress in more ways than one. One of those ways […] The post The Importance of Data Categorization In A…
Spike in Layoffs Pose Serious Cybersecurity Concerns
Different Types of Risk Exposure and Best Practices for Protecting Your Data By Adam Gavish, CEO & Cofounder, DoControl There has been a spike in layoffs over the last few […] The post Spike in Layoffs Pose Serious Cybersecurity Concerns…
Red Sea Crisis and the Risk of Cyber Fallout
By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction As Israel’s military campaign in Gaza continues, the United States as a political sponsor of Israel is contending with regional provocations by […] The post Red Sea Crisis and the Risk of…