The enemy is using cyber weapons that are hard to track and even harder to fully attribute to an adversary, companies need to act now By Richard Staynings, Chief Security […] The post Protecting Critical Infrastructure from Cyber Attack appeared…
Tag: Cyber Defense Magazine
Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead
By Craig Burland, CISO, Inversion6 In a world driven by technology, innovation and rapid change, companies often find themselves touting the mantra of “ruthless prioritization.” The idea sounds pragmatic: with […] The post Ruthless Prioritization Is a Myth: Aim For…
Ditch the Worry – Switch to Secure WhatsApp Alternative
By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it has been designed as a personal and social messaging service. […] The post Ditch the Worry – Switch to Secure…
What the Government Can Learn from the Private Sector in Pursuit of Zero Trust
By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order on Improving the Nation’s Cybersecurity, outlining one of the administration’s […] The post What the Government Can Learn from the…
Protecting Your Business and Personal Data
By Brian Lonergan, VP of Product Strategy, Identity Digital October celebrated National Cybersecurity Awareness Month (NCSAM), a time when public and private sectors, along with tribal communities, join forces to […] The post Protecting Your Business and Personal Data appeared…
Navigating Secure Adoption of AI Across Government and Connected Infrastructure
By Gaurav (G.P.) Pal, Founder and CEO, stackArmor This year, artificial intelligence has exploded in popularity across all sectors and industries — including the federal government. AI is being used […] The post Navigating Secure Adoption of AI Across Government…
North Korea–Russia Summit
A new alliance in cyberspace? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction Last month, North Korean leader Kim Jong Un took a rare trip beyond his country’s borders – […] The post North Korea–Russia Summit appeared first on Cyber…
It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence
By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware to tried and true brute force attacks. At this point, […] The post It’s Time to Tear Down the Barriers…
Building For a More Secure Future: How Developers Can Prioritize Cybersecurity
By Jeremy Butteriss, EGM Ecosystem and Partnerships, Xero An iconic moment in the rise of ecosystems was Steve Ballmer on stage saying ‘developers, developers, developers’ at the 1999 Microsoft .NET […] The post Building For a More Secure Future: How…
How to Create a Threat Hunting Program for Your Business
By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s job is to proactively seek out potential problems and stop […] The post How to Create a Threat Hunting Program…
How To Improve Security Capacities of The Internet of Things?
By Milica D. Djekic The security of the Internet of Things (IoT) is one of the main challenges of today. Many IoT assets could get an easy target to cyber […] The post How To Improve Security Capacities of The…
Developers Hold the New Crown Jewels. Are They Properly Protected?
By Aaron Bray, CEO. Phylum Cybersecurity has changed dramatically in the last four years. During the pandemic, organizations around the globe found themselves faced with accelerating digital transformation initiatives, remote […] The post Developers Hold the New Crown Jewels. Are…
Expect to Fail: How Organizations Can Benefit from a Breach
By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions in digital security. As CISO, you bear primary responsibility for […] The post Expect to Fail: How Organizations Can Benefit…
When the Enemy Is DDoS, Holistic Protection Is a Must
An infinite variety of attack methods require customizable solutions. By Sean Newman, VP/Product Management, Corero Sun Tzu was an exceptional general, strategist, and philosopher, and certainly one of the most […] The post When the Enemy Is DDoS, Holistic Protection…
Keeping SaaS Data Under Wraps
A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business of image and reputation don’t want to get bad publicity. […] The post Keeping SaaS Data Under Wraps appeared first…
Data Sanitization for End-Of-Use Assets
Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe are prioritizing Cybersecurity efforts as threats from cyber criminals are […] The post Data Sanitization for End-Of-Use Assets appeared first…
SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK
Top cybersecurity leaders in the NightDragon Advisor Council provide perspective on 2023 trends and 2024 spending outlook As our digital age continues to expand and become ubiquitous across every piece […] The post SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS…
Fostering Total Trust with A ‘Zero-Trust’ Approach in Financial Services
By Stefan Auerbach, CEO, Utimaco Despite annual spending on cybersecurity by the financial services industry reaching $600 million annually – a figure which is growing every year – trust in […] The post Fostering Total Trust with A ‘Zero-Trust’ Approach…
Chromecast End-of-Life Announcement Highlights Urgent Need for Patch Management Reform Among Hybrid Workers
By Joao Correia, Technical Evangelist for Tuxcare In April this year, Google announced the discontinuation of support for its original Chromecast device. The first-generation Chromecast had been a highly successful […] The post Chromecast End-of-Life Announcement Highlights Urgent Need for…
Common Pitfalls of Running On-Premises SIEM Solutions
By Vinaya Sheshadri, Practice Leader Cyber Security at RiverSafe A good SIEM tool is a necessity for any organisation looking to protect their digital environment. They help security teams be […] The post Common Pitfalls of Running On-Premises SIEM Solutions…