The Darwinian Effect in the Threat Community By Augusto Barros, Vice President Cyber Security Evangelist at Securonix Among the typical predictions for the upcoming new year, we often see something […] The post Evolution and Escalation of Cybersecurity Threats appeared…
Tag: Cyber Defense Magazine
SolarWinds Lawsuit Reinforces the Need for Critical Communication Between CISOs and the C-Suite
By Jose Seara, Founder and CEO, Denexus As demonstrated by recent developments in the legal matter between SolarWinds and the SEC, the landscape of CISO liability is expanding. After the […] The post SolarWinds Lawsuit Reinforces the Need for Critical…
Combating Terrorism Using Information Protection
By Milica D. Djekic The global landscape has changed significantly since a beginning of the new millennium as a threat to everyday life and work is arising day by day […] The post Combating Terrorism Using Information Protection appeared first…
Reshaping the Focus of Cybersecurity
Key Insights from the International Counter Ransomware Initiative Statement By Todd Thorsen, Chief Information Security Officer, CrashPlan Earlier in November, media outlets widely reported the contents of a remarkable joint […] The post Reshaping the Focus of Cybersecurity appeared first…
MGM & Caesars Cyberattacks: Lessons Learned
By Tim Callan, Chief Experience Officer, Sectigo In the aftermath of the MGM and Caesars cyberattacks, many IT professionals are probably asking themselves, am I next? What lessons can businesses […] The post MGM & Caesars Cyberattacks: Lessons Learned appeared…
NIS 2: From Obligation to Opportunity
By Jacques de La Rivière, CEO, Gatewatcher The world of cybersecurity is constantly evolving; not only in talent, products, and technologies, but also in regulatory requirements. As cyber threats evolve […] The post NIS 2: From Obligation to Opportunity appeared…
Top 6 Security Challenges of SMEs
By Michal Gil, Head of Product, CybeReady Small to Medium Enterprises (SMEs) are vital for innovation and economic growth, and their role in larger supply chains makes them an attractive […] The post Top 6 Security Challenges of SMEs appeared…
Is 2024 the Year of Cloud Repatriation?
By Eyal Arazi, cloud security manager at Radware Eyal Arazi, cloud security manager at Radware, looks at why organizations once committed to cloud-first and cloud-only strategies are now reevaluating their […] The post Is 2024 the Year of Cloud Repatriation?…
How A Strong Digital Culture Is the Foundation For Successful Metaverse Exploration
Businesses must become digital-first to understand the emerging realm of the metaverse and develop the innovations that will drive success there. By Jaime McMahon, CDO, LineZero The metaverse is open […] The post How A Strong Digital Culture Is the…
Beyond Traditional Cyber Defences: The Rise of Outcome-Based Security In Modern Business
By Paul Brucciani, Cyber Security Advisor at WithSecure™ Cyber security is no longer just about keeping systems and devices safe, it’s also become central in enabling business to achieve their […] The post Beyond Traditional Cyber Defences: The Rise of…
Ai, Cybersecurity Awareness, And Communication
Moving beyond the hype, are AI cybersecurity solutions as advanced as they claim? By John Trest, Chief Learning Officer, VIPRE Security Group The emergence of numerous AI-driven cybersecurity products emphasizes […] The post Ai, Cybersecurity Awareness, And Communication appeared first…
Addressing Bias in Insider Risk Monitoring
By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often take similar steps to protect data from internal and outside […] The post Addressing Bias in Insider Risk Monitoring appeared…
AI in DevSecOps: Moving from A Co-Pilot to An Autopilot
By Stephen Chin, VP of Developer Relations, JFrog What do autonomous driving and software (SW) development have in common? At first glance, not much. But when taking a closer look […] The post AI in DevSecOps: Moving from A Co-Pilot…
Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game
If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure across all sectors, and “be resilient” to the constant onslaught […] The post Prevention Strategies Inevitably Become a Constant Cat-and-Mouse…
AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users
Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at Jumio While AI-driven automation brings benefits, it also gives hackers […] The post AI-Enhanced Identity Fraud: A Mounting Threat to…
AI: The Human Touch in Cybersecurity Recruitment
Harnessing the Digital Scout for Cybersecurity’s Future By Darrin Straff, Senior Staffing Consultant, NinjaJobs Introduction: In the digital age, where cybersecurity threats are ever-evolving, AI’s role in strengthening our defenses […] The post AI: The Human Touch in Cybersecurity Recruitment…
Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors
A Vital Set of Cybersecurity Best Practices By John Funk, Creative Consultant, SevenAtoms A new cybersecurity mandate being rolled out by the Pentagon has implications that reach beyond the military […] The post Why Cybersecurity Maturity Model Certification (CMMC) Matters…
The Tech Jobs That AI Will Not Disrupt
By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world in decades. It has unleashed new capabilities that promise to […] The post The Tech Jobs That AI Will Not…
3 New Risks That CISOs Will Face in 2024
By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere are increasingly vigilant about how their data is being gathered […] The post 3 New Risks That CISOs Will Face…
How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance
Steps To Implement Cyber Controls and Processes By Juliana Spofford, General Counsel and Chief Privacy Officer, Aidentified In today’s tech world, it is often difficult to determine which businesses you […] The post How Small and Mid-Sized Businesses Can Achieve…