By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […] The post Addressing Bias in Insider Risk Monitoring appeared…
Tag: Cyber Defense Magazine
How Autonomous Vehicles are Revolutionizing the Last-Mile Logistics Industry
Cybersecurity will be one of the key concerns as last-mile logistics companies look to enhance efficiency with autonomous vehicles. By Anar Mammadov, CEO, Senpex Technologies Travelers who hail a taxi […] The post How Autonomous Vehicles are Revolutionizing the Last-Mile…
Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’
By Brett Raybould, EMEA Solutions Architect, Menlo Security Phishing remains one of the most prevalent challenges facing organisations, with more than three billion malicious emails estimated to be sent around […] The post Phishing Campaign Exploits Open Redirection Vulnerability In…
The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox
By Ken Cox, President of Hostirian Despite the technological advancements brought by automation and the enhanced capabilities of data analytics that have transformed decision-making processes, the digital age has proved […] The post The Ethics And Privacy Concerns Of Employee…
The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles
By Kevin Beasley, CIO, VAI Increased competition and new regulatory requirements are increasing the tempo of digital transformation among mid-market companies. In fact, Deloitte’s 2023 Mid-Market Technology Trend report found […] The post The Balancing Act for Mid-Market Firms: Navigating…
ImmuniWeb AI Platform
Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […] The post ImmuniWeb AI Platform appeared first on Cyber…
OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft
Securing Operational Technology ACCESS THE RECORDING Kick-start your OT security program, wherever you are in your journey. Gain industry-specific insights into OT cybersecurity challenges and equip yourself with practical strategies […] The post OT Security Q&A for Cybersecurity Leaders with…
Safeguarding the Code That Drives Modern Vehicles
By Soujanya Ain is a Product Marketing Manager at GitGuardian The automotive landscape has evolved dramatically, from mechanical marvels to sophisticated platforms on wheels driven by intricate computer systems. Surprisingly, […] The post Safeguarding the Code That Drives Modern Vehicles…
AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud
By Tim Ward, Chief Strategy Officer, XConnect Robocalls are relentlessly targeting consumers and causing mistrust for the telecom industry as a whole. This is a problem that is accelerating as […] The post AI and the Next Wave of Robocalls:…
Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack
By Carl Cadregari, Executive Vice President, FoxPointe Solutions Regardless of the industry in which they operate, organizations have likely witnessed the wave of destructive MOVEit breaches sweeping the globe during […] The post Building a Secure Data-Protection Infrastructure to Protect…
Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset
By John A. Smith, CSO, Conversant Group If data is the new oil, this holds especially true for law firms as they are wholly dependent on the information they store […] The post Do You Know Where Your Data Is?…
2024 Predictions: The Rise of AI Brings New Security Challenges
By Imperva Executives: Karl Triebes, Lebin Cheng, Peter Klimek, Lynn Marks, and Terry Ray The emergence of generative AI has put new resources in the hands of both attackers and […] The post 2024 Predictions: The Rise of AI Brings…
SIEM vs XDR: Capabilities and Key Differences
We compare the differences in SIEM and XDR’s respective contributions to security By Aimei Wei, Chief Technical Officer and Founder, Stellar Cyber All enterprises comprise vast webs of interconnected devices. […] The post SIEM vs XDR: Capabilities and Key Differences…
What’s The Role of Gaslighting in The Cyber Security Context of Social Engineering?
By Anna Drescher, Freelance Writer and Mental Health Specialist A few years ago, I received an email from Apple stating that someone had made a purchase from my account. They […] The post What’s The Role of Gaslighting in The…
Generative Ai: The Future of Cloud Security
By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation Generative AI: The Future of Cloud Security As the digital landscape undergoes a relentless […] The post Generative Ai: The Future of Cloud Security…
With The World Distracted, China Stirs Trouble in The Asia Pacific
By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction – Thrilla in Manilla President Biden warned that “conflict and chaos could spread to the Indo-Pacific” from late October, and, amidst the […] The post With The World Distracted, China Stirs Trouble…
Wireless Peripheral Devices – Security Risk, Exploits and Remediation
This article covers the importance of Wireless Peripheral Device Security, the risks involved, and ways to remediate the security exploits. By Prathibha Muraleedhara and Akhilesh Bhangepatil Abstract The advancement of […] The post Wireless Peripheral Devices – Security Risk, Exploits…
Bolstering IoT Cybersecurity Amid an Evolving Landscape: A CEO’s Perspective
By Ron Konezny, President & CEO, Digi International The most cybersecurity-savvy members of an organization are typically not the key decision makers. This disconnect may be one of the reasons […] The post Bolstering IoT Cybersecurity Amid an Evolving Landscape:…
Why Companies Are Still Investing in Tech During an Economic Slowdown
By Luke Wallace, VP of Engineering at Bottle Rocket With rising oil prices, higher interest rates, and an economic downturn plaguing Europe and China throughout 2023, recession is looming in […] The post Why Companies Are Still Investing in Tech…
Why Higher Education Is So Vulnerable to Cyber Attacks — And What to Do
By Zac Amos, Features Editor, ReHack Cyberattacks are a growing problem worldwide as they can cause significant damage to any organization, big or small. Higher education institutions are especially vulnerable, […] The post Why Higher Education Is So Vulnerable to…