By Michal Gil, Head of Product, CybeReady Small to Medium Enterprises (SMEs) are vital for innovation and economic growth, and their role in larger supply chains makes them an attractive […] The post Top 6 Security Challenges of SMEs appeared…
Tag: Cyber Defense Magazine
Is 2024 the Year of Cloud Repatriation?
By Eyal Arazi, cloud security manager at Radware Eyal Arazi, cloud security manager at Radware, looks at why organizations once committed to cloud-first and cloud-only strategies are now reevaluating their […] The post Is 2024 the Year of Cloud Repatriation?…
How A Strong Digital Culture Is the Foundation For Successful Metaverse Exploration
Businesses must become digital-first to understand the emerging realm of the metaverse and develop the innovations that will drive success there. By Jaime McMahon, CDO, LineZero The metaverse is open […] The post How A Strong Digital Culture Is the…
Beyond Traditional Cyber Defences: The Rise of Outcome-Based Security In Modern Business
By Paul Brucciani, Cyber Security Advisor at WithSecure™ Cyber security is no longer just about keeping systems and devices safe, it’s also become central in enabling business to achieve their […] The post Beyond Traditional Cyber Defences: The Rise of…
Ai, Cybersecurity Awareness, And Communication
Moving beyond the hype, are AI cybersecurity solutions as advanced as they claim? By John Trest, Chief Learning Officer, VIPRE Security Group The emergence of numerous AI-driven cybersecurity products emphasizes […] The post Ai, Cybersecurity Awareness, And Communication appeared first…
Addressing Bias in Insider Risk Monitoring
By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […] The post Addressing Bias in Insider Risk Monitoring appeared…
AI in DevSecOps: Moving from A Co-Pilot to An Autopilot
By Stephen Chin, VP of Developer Relations, JFrog What do autonomous driving and software (SW) development have in common? At first glance, not much. But when taking a closer look […] The post AI in DevSecOps: Moving from A Co-Pilot…
Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game
If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure across all sectors, and “be resilient” to the constant onslaught […] The post Prevention Strategies Inevitably Become a Constant Cat-and-Mouse…
AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users
Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at Jumio While AI-driven automation brings benefits, it also gives hackers […] The post AI-Enhanced Identity Fraud: A Mounting Threat to…
AI: The Human Touch in Cybersecurity Recruitment
Harnessing the Digital Scout for Cybersecurity’s Future By Darrin Straff, Senior Staffing Consultant, NinjaJobs Introduction: In the digital age, where cybersecurity threats are ever-evolving, AI’s role in strengthening our defenses […] The post AI: The Human Touch in Cybersecurity Recruitment…
Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors
A Vital Set of Cybersecurity Best Practices By John Funk, Creative Consultant, SevenAtoms A new cybersecurity mandate being rolled out by the Pentagon has implications that reach beyond the military […] The post Why Cybersecurity Maturity Model Certification (CMMC) Matters…
The Tech Jobs That AI Will Not Disrupt
By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to […] The post The Tech Jobs That AI Will Not…
3 New Risks That CISOs Will Face in 2024
By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere are increasingly vigilant about how their data is being gathered […] The post 3 New Risks That CISOs Will Face…
How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance
Steps To Implement Cyber Controls and Processes By Juliana Spofford, General Counsel and Chief Privacy Officer, Aidentified In today’s tech world, it is often difficult to determine which businesses you […] The post How Small and Mid-Sized Businesses Can Achieve…
Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments
By Victor Atkins, Director | Cybersecurity, 1898 & Co. The rise in the age of digitalization has provided numerous benefits for modern society, from the ability to conduct a telehealth […] The post Closing the Gap: Safeguarding Critical Infrastructure’s IT…
The Crumbling Castle
By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy involved building a strong perimeter around the corporate network, like […] The post The Crumbling Castle appeared first on Cyber…
The Cybersecurity Bridge: A Necessary Connection for IT and Communications
By Jeff Hahn, principal of Hahn, and Kenneth Holley, Principal and chairman of Silent Quadrant With the increasing unpredictability and sophistication of cyber threats, IT and communications departments must align […] The post The Cybersecurity Bridge: A Necessary Connection for…
Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines
SEC’s New Guidelines Prompt Proactive Cyber Risk Management By Meghan Maneval, Director of Technical Product Management at RiskOptics Recently, the Securities and Exchange Commission (SEC) adopted rules about the handling […] The post Three Things to Know About the New…
Striking The Right Balance: Cloud and Cyber Priorities for SMEs
By Mark Allen, Head of cyber, CloudCoCo As small and medium-sized enterprises (SMEs) embark on their digitalization journey, they face a crucial dilemma: Should they prioritize the adoption of cloud […] The post Striking The Right Balance: Cloud and Cyber…
Shifting Left Means Shifting Smart: Managing Software Risk With ASPM
By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up software delivery, security practices have had to evolve. Development teams […] The post Shifting Left Means Shifting Smart: Managing Software…