By Caroline McCaffery, Co-Founder and CEO of ClearOPS Introduction to Vendor Management Why does every license agreement and data protection addendum, suddenly, include a right for the buyer to perform […] The post Vendors Beware of the Cybersecurity Audit appeared…
Tag: Cyber Defense Magazine
How One Industry Exemplifies the Importance Of Cybersecurity In Critical Infrastructure Assurance
And What We Can Learn From It By Brian Hesse, Co-Owner, President, and Chief Executive Officer of PerenniAL Summary Cybersecurity professionals, as with virtually every other organizational function, are always […] The post How One Industry Exemplifies the Importance Of…
Zero Trust Matures, Insider Threat Programs Take Off, and AI Doesn’t Change Things that Much Yet: 2024 Cybersecurity Predictions
By Chris Scheels, VP of Product Marketing at Gurucul How will security analytics, machine learning/AI, and applied data science in the security space evolve in the coming year? Here are […] The post Zero Trust Matures, Insider Threat Programs Take…
Zero Trust: Navigating the Labyrinth of Laws in a Borderless Digital Age
By Jaye Tillson, Director of Strategy & Field CTO, Axis Security The digital landscape, once akin to a fortified city with well-defined perimeters safeguarding precious data, now faces the onslaught […] The post Zero Trust: Navigating the Labyrinth of Laws…
Three Key Threats Fueling the Future of Cyber Attacks
The Role of Identity Data Management in Achieving CISA’S Strategic Goals
Zero Trust Access: The Transformative Blueprint for Achieving Regulatory Compliance
The Quantum Shift
CISO Life: the Good, the Bad, the Ugly
The Pitfalls of Periodic Penetration Testing & What to Do Instead
The Case Study: The Exploitation of Mechatronics Systems
Strengthening Financial Services: Embracing the Digital Operational Resilience Act (DORA) for Cybersecurity Resilience
Speaking Cyber-Truth: The CISO’s Critical Role in Influencing Reluctant Leadership
Government Communications: The Threats
By Nicole Allen, Marketing Manager at Salt Communications In an age where information flows freely and rapidly, government communications have never been more vulnerable. The digital age has ushered in […] The post Government Communications: The Threats appeared first on…
SASE and Zero Trust: A Powerful Combination
By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Gone are the days when network security resembled a medieval castle. It was protected by a robust drawbridge and moat. In our […] The post SASE and Zero Trust: A Powerful Combination…
A 5-Minute Refresher to Cryptography
(featuring Alice and Bob) by Rajvi Shroff It’s an age-old question. Alice wants to send a message to Bob. But how can Alice send it to Bob without Eve, the […] The post A 5-Minute Refresher to Cryptography appeared first…
Smart Traffic Signals Security in the Era of AI and Smart Cars
Analyzing the Trade-off Between Efficiency and Security in Smart Traffic Signal Technology Integration. by Samridhi Agarwal, Masters Student, CMU Once a simple concept with red, yellow, and green bulbs, traffic […] The post Smart Traffic Signals Security in the Era…
Bridging IT and OT Cybersecurity with AI
Reduce Alerts by 57% with Difenda AIRO By Andrew Hodges, VP Service Delivery & Product Development, Difenda In a technology-driven world, where even the most everyday devices are connected to […] The post Bridging IT and OT Cybersecurity with AI…
Accelerate the path to PCI DSS 4.0 adoption
By Héctor Guillermo Martínez, President of GM Sectec With the release of a new version of the PCI DSS 4.0 Payment Card Industry Data Security Standard, the safety and security […] The post Accelerate the path to PCI DSS 4.0…
Real Time Exposure Detection Is the Missing Element of Every Cybersecurity Strategy
Detecting threats and vulnerabilities in real-time is crucial for an effective cybersecurity strategy to protect against cybercriminals. By Or Shoshani, CEO and Co-founder, Stream Security Cybersecurity teams are often at […] The post Real Time Exposure Detection Is the Missing…
