A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business of image and reputation don’t want to get bad publicity. […] The post Keeping SaaS Data Under Wraps appeared first…
Tag: Cyber Defense Magazine
Data Sanitization for End-Of-Use Assets
Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe are prioritizing Cybersecurity efforts as threats from cyber criminals are […] The post Data Sanitization for End-Of-Use Assets appeared first…
SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK
Top cybersecurity leaders in the NightDragon Advisor Council provide perspective on 2023 trends and 2024 spending outlook As our digital age continues to expand and become ubiquitous across every piece […] The post SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS…
Fostering Total Trust with A ‘Zero-Trust’ Approach in Financial Services
By Stefan Auerbach, CEO, Utimaco Despite annual spending on cybersecurity by the financial services industry reaching $600 million annually – a figure which is growing every year – trust in […] The post Fostering Total Trust with A ‘Zero-Trust’ Approach…
Chromecast End-of-Life Announcement Highlights Urgent Need for Patch Management Reform Among Hybrid Workers
By Joao Correia, Technical Evangelist for Tuxcare In April this year, Google announced the discontinuation of support for its original Chromecast device. The first-generation Chromecast had been a highly successful […] The post Chromecast End-of-Life Announcement Highlights Urgent Need for…
Common Pitfalls of Running On-Premises SIEM Solutions
By Vinaya Sheshadri, Practice Leader Cyber Security at RiverSafe A good SIEM tool is a necessity for any organisation looking to protect their digital environment. They help security teams be […] The post Common Pitfalls of Running On-Premises SIEM Solutions…
DevOps’ Big Challenge: Limiting Risk Without Impacting Velocity
By Asaf Karas, CTO for JFrog Security Businesses leverage enterprise applications to build a competitive edge and move quickly. These applications need to be built, secured, deployed, and updated on […] The post DevOps’ Big Challenge: Limiting Risk Without Impacting…
Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program
The post Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program appeared first on Cyber Defense Magazine. This article has been indexed from Cyber Defense Magazine Read the original article: Webinar: Managing…
ChatGPT For Enterprises Is Here – But CEOs First Want Data Protections
Amidst the rise of generative AI, business leaders must navigate the delicate balance of adoption, security, and trust. By Apu Pavithran, CEO and Founder, Hexnode At the end of August, […] The post ChatGPT For Enterprises Is Here – But…
The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace
By Anurag Lal, President and CEO of NetSfere Using personal messaging apps for business communication and collaboration is harmless – right? Wrong. This practice, which is unfortunately still widespread in […] The post The Cyber Risk Nightmare and Financial Risk…
How To Combat the Mounting ‘Hacktivist’ Threat
By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less by money than ideology. These ‘hacktivists’ are actively targeting businesses […] The post How To Combat the Mounting ‘Hacktivist’ Threat…
OT Cybersecurity: Safeguarding Building Operations in a Digitized World
By Mirel Sehic, Global Director of Cyber Security, Honeywell In an increasingly digitized world, the looming threat of cyberattacks has cast a shadow over nearly every aspect of our lives. […] The post OT Cybersecurity: Safeguarding Building Operations in a…
7 Steps to Build a Defense in Depth Strategy for Your Home
By Roger Spears – Cybersecurity Project Manager, Schneider Downs One of the primary pillars of cybersecurity is having a “defense in depth” strategy, which means layering defensive security measures to […] The post 7 Steps to Build a Defense in…
Zombie APIs: The Scariest Threat Lurking in The Shadows?
By Dan Hopkins, VP of Engineering at StackHawk IT modernization and digital transformation initiatives, combined with faster software deployment lifecycles, has caused an exponential increase in the size and scale […] The post Zombie APIs: The Scariest Threat Lurking in…
The Crucial Need for a Secure Software Development Lifecycle (SSDLC) in Today’s Digital Landscape
By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation. “Securing the software delivery pipeline is as important as securing the software that is […] The post The Crucial Need for a Secure Software…
Beyond Passwords: AI-Enhanced Authentication in Cyber Defense
By Kathleen Dcruz Why all the noise about artificial intelligence? Now more than ever, AI is becoming part of our lives faster than you could imagine. The question that begs, […] The post Beyond Passwords: AI-Enhanced Authentication in Cyber Defense…
AI And Ad Fraud: Growing Risks for Marketers Using Google’s AI-Based Advertising Campaigns
Google’s Performance Max (PMax) – AI has ignited a flurry of concerns relating to data protection and security, and organisations must act now to prevent further damaging losses. By Mathew […] The post AI And Ad Fraud: Growing Risks for…
Bolster an Organizational Cybersecurity Strategy with External Data Privacy
Enterprise threat protection is missing this critical component By Harry Maugans, CEO, Privacy Bee Companies fight hard to find, cajole and incentivize top talent to run their business. They also […] The post Bolster an Organizational Cybersecurity Strategy with External…
An Age-by-Age Guide to Online Safety for Kids
By Chelsea Hopkins, Social Media Manager, Fasthosts The internet is a fast-changing world of information that allows kids to play, create, browse, and engage with different people from all corners […] The post An Age-by-Age Guide to Online Safety for…
Your #1 Security Initiative in 2024 Should be Operational Resilience
The cyber world is filled with lots of scary threats and new buzzwords, none of them bigger than AI. As boards, CEOs, and security leadership teams decide where to put […] The post Your #1 Security Initiative in 2024 Should…