By Stephen de Vries, CEO, IriusRisk In 2023, we saw governments and global cybersecurity agencies begin to put the building blocks in place for secure design and take cyber defense […] The post 2024: The Year of Secure Design appeared…
Tag: Cyber Defense Magazine
Fortifying Digital Health Against Cyber Attacks
By Nissim Ben-Saadon, Director of Innovation, CYREBRO In today’s digital era, the healthcare industry stands at the forefront of technological adoption, heavily relying on digital systems such as Electronic Health […] The post Fortifying Digital Health Against Cyber Attacks appeared…
Strengthening Cyber Defense with Threat Intelligence Operations
By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to […] The post Strengthening Cyber Defense with Threat Intelligence Operations…
A Consolidated Approach to Fraud: Bringing Together Risk Insights, Organizations and Technology
By Kimberly Sutherland, vice president, fraud and identity strategy, LexisNexis® Risk Solutions Digital fraud has seen a substantial increase in recent years, mainly due to the sharp rise in digital […] The post A Consolidated Approach to Fraud: Bringing Together…
Cybersecurity or Cyber Resilience: Which Matters More?
Planning Beyond an Enterprise Security Posture and Toward Reliable Business Continuity By Amanda Satterwhite, Managing Director of Cyber Growth & Strategy, Accenture Federal Services Cybercrimes in the United States have […] The post Cybersecurity or Cyber Resilience: Which Matters More?…
Unlocking the Power of Governance in Cybersecurity: NIST CSF 2.0 Introduces ‘Govern’ to Redefine CISO Leadership in 2024
By Shirley Salzman, CEO and Co-Founder, SeeMetrics As all eyes are towards the updated NIST CSF 2.0 publication, some of the spoilers have already been published – now security leaders […] The post Unlocking the Power of Governance in Cybersecurity:…
Will We Ever See Federal Data Breaches End Entirely?
Government cybersecurity may get worse before it gets better. By April Miller, Managing Editor, ReHack Magazine Data breaches are a problem in virtually every industry. However, they carry extra weight […] The post Will We Ever See Federal Data Breaches…
Why Is Hardware More Secure than Software?
The underlying differences between hardware and software when implementing critical cryptosystems. By Kimmo Järvinen, Co-founder and CTO, Xiphera The majority of today’s cryptographic implementations rely on software running on general-purpose […] The post Why Is Hardware More Secure than Software?…
Three Rules of Crisis Management: Lessons from the War in Israel
Crises and challenges are a staple of the technology and cybersecurity industries. While we do our best to plan for growth, setbacks, and business resilience, some crises can’t be anticipated. […] The post Three Rules of Crisis Management: Lessons from…
Rise of the Cyber Supervillain
By Guy Rosefelt, Chief Product Officer, Sangfor Technologies In my Cyber HotSeat Interview with Gary Miliefsky, I made a prediction about the rise of the Cyber Supervillain. This is an […] The post Rise of the Cyber Supervillain appeared first…
Cyber resilience: Safeguarding your enterprise in a rapidly changing world
By Srinivasan CR, Executive Vice President-Cloud and Cybersecurity Services & Chief Digital Officer, Tata Communications In a hyperconnected world, cyberattacks are increasingly common. Just ransomware activity alone was up 50% […] The post Cyber resilience: Safeguarding your enterprise in a…
The Next Generation of Endpoint Security Is Being Reimagined Today
By Vivek Ramachandran, CEO & Founder, SquareX Gone are the days when traditional antivirus solutions were the bulwark of endpoint security. In the past, these antivirus programs were largely sufficient, […] The post The Next Generation of Endpoint Security Is…
The Importance of Data Categorization In A Threat-Filled Landscape
By Dr. Pragyansmita Nayak, Chief Data Scientist, Hitachi Vantara Federal National security is amid a transformative journey driven by technological progress in more ways than one. One of those ways […] The post The Importance of Data Categorization In A…
Spike in Layoffs Pose Serious Cybersecurity Concerns
Different Types of Risk Exposure and Best Practices for Protecting Your Data By Adam Gavish, CEO & Cofounder, DoControl There has been a spike in layoffs over the last few […] The post Spike in Layoffs Pose Serious Cybersecurity Concerns…
Red Sea Crisis and the Risk of Cyber Fallout
By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction As Israel’s military campaign in Gaza continues, the United States as a political sponsor of Israel is contending with regional provocations by […] The post Red Sea Crisis and the Risk of…
Quishing Campaign Exploits Microsoft Open Redirect Vulnerability
Diving into a new sophisticated campaign, exploiting Microsoft’s Open Redirect vulnerability through quishing By Elad Damari, Incident Response Group Manager, Perception Point QR codes can be found almost everywhere, helping […] The post Quishing Campaign Exploits Microsoft Open Redirect Vulnerability…
Overcoming Common Data Security Challenges
By Claude Mandy, Chief Evangelist at Symmetry Systems Organizations depend on data to operate. From day-to-day operations to strategic decisions, data is what keeps an organization ticking. As digital transformation […] The post Overcoming Common Data Security Challenges appeared first…
Detect and Destroy Cyber Threats with Red Piranha
By Adam Bennett, CEO, Red Piranha Red Piranha is Australia’s leading cybersecurity technology and solutions developer, manufacturer, and official member of Team Defence Australia for advanced cybersecurity solutions. Dedicated to […] The post Detect and Destroy Cyber Threats with Red…
Revolutionizing Cybersecurity Recruitment and Networking: The Cyberr.ai Approach
By Laurent Halimi, Founder, Cyberr In the wake of 4 million unfilled cybersecurity positions globally in 2023, conventional hiring practices have proven inadequate. Recognizing this glaring gap, Cyberr.ai has emerged […] The post Revolutionizing Cybersecurity Recruitment and Networking: The Cyberr.ai…
What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform
By Tom Tovar, Co-creator and CEO of Appdome There’s a major battle brewing between platform vs. platformization companies in cybersecurity. On either side, cybersecurity heavyweights are racing to offer fully […] The post What Palo Alto Networks and CrowdStrike Teach…