Digital transformation has urged organizations across various industries to adopt multi-cloud strategies. They need to find the right balance for security and growth. By Michael Rostov, Entrepreneur and Co-Founder at […] The post Overcoming Multi-Cloud Security Challenges: The Power of…
Tag: Cyber Defense Magazine
Artificial Deception: The State Of “AI” In Defense and Offense
By Ken Westin, Field CISO, Panther Labs If you have seen any of my talks, I often say that the infosec industry wouldn’t exist without deception. Although I’ve seen enough […] The post Artificial Deception: The State Of “AI” In…
Master Security by Building on Compliance with A Risk-Centric Approach
By Meghan Maneval, Vice President of Product Strategy and Evangelism, RiskOptics In recent years, a confluence of circumstances has led to a sharp rise in IT risk for many organizations. […] The post Master Security by Building on Compliance with…
Charting a Trustworthy AI Journey
Sound cybersecurity principles for responsible generative AI innovation By Lisa O’Connor, Managing Director—Accenture Security, Cybersecurity R&D, Accenture Labs As companies turn to generative AI to transform business operations, traditional notions […] The post Charting a Trustworthy AI Journey appeared first…
Understanding the Escalating Threat of Web DDoS Tsunami Attacks
By Uri Dorot, Senior Security Solutions Lead at Radware Whether it’s hacktivists conducting cyberwarfare or ransom-seeking criminals targeting vulnerable firms in financial services, retail, energy, or transportation, a new breed […] The post Understanding the Escalating Threat of Web DDoS…
As Digital Payments Explode in Popularity, Cybercriminals are Taking Notice
By Norman Comstock, Managing Director, and Luke Nelson, Managing Director, Cybersecurity Solutions, UHY Consulting With $54 trillion in payments flowing through the world’s leading transaction avenues, the payments space is […] The post As Digital Payments Explode in Popularity, Cybercriminals…
Why Continuous Training Must Come Before The AI-driven SDLC
By Mike Burch, Director of Application Security, Security Journey Despite the hype, generative AI is unlikely to transform the world. But there are sectors where it could significantly disrupt the […] The post Why Continuous Training Must Come Before The…
The Future of Modern Networks Is Automated Threat Intelligence.
By Amit Dhingra, Executive Vice President of Network Services, NTT During the past three years, the enterprise cybersecurity environment has changed drastically. Security threats now come from any number of […] The post The Future of Modern Networks Is Automated…
The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of
By Ivan Shefrin, Executive Director, Managed Security Services, Comcast Business The rise of DDoS attacks is old news. Now, these attacks are becoming more dangerous, targeted, and detrimental as they […] The post The State of DDoS Attacks: Evolving Tactics…
The U. S. Cyber Trust Mark: Providing Assurance That IoT Devices Are Trustworthy
By Mike Nelson, Vice President of Digital Trust, DigiCert It’s safe to say that in 2023, the Internet of Things (IoT) train has left the station and is full speed […] The post The U. S. Cyber Trust Mark: Providing…
URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes
By Zack Schwartz, Chief Revenue Officer, Trustifi As a provider of cybersecurity, we notice when certain trends begin to emerge, judging mostly from the interest and response levels that we […] The post URL Hunting: Proactive Cybersecurity Designed to Improve…
The Digital Transformation Blueprint: A Mosaic of Technology, Collaboration, And Security
By Ani Chaudhuri, CEO, Dasera In the Digital Age, businesses confront a dynamic landscape, compelled by the allure of innovation while wary of potential setbacks. This paper zeroes in on […] The post The Digital Transformation Blueprint: A Mosaic of…
The Evolving Landscape of Ransomware Attacks
2023 – What is new in the world of Ransomware By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Ransomware has been making headlines since 2021, and it continues to do […] The post The Evolving Landscape of Ransomware Attacks appeared…
Proven Strategies to Fix This Cybersecurity Shortage
Cyber Leader and Former Marine breaks down how we can recruit and train new cyber talent for this growing tech labor shortage By Chris Starling, Assistant Vice President, NPower Skillbridge […] The post Proven Strategies to Fix This Cybersecurity Shortage…
Securing The Virtual Runway to The Cloud
By Jason Mafera, Field CTO, North America, IGEL The ‘endpoint’ has transformed from traditional desktop hardware to any number of devices, digital workspaces, and locations, offering new opportunities for cybercriminals […] The post Securing The Virtual Runway to The Cloud…
Sophisticated Cyber Threats Require a New Approach to Digital Security in Healthcare.
By Saeed Valian, Chief Information Security Officer, symplr In the era of modernization, healthcare organizations are pushing for digitalization in their EMR’s. While there are significant benefits here, it does […] The post Sophisticated Cyber Threats Require a New Approach…
The Case Study: The Exploitation of Business Assets
By Milica D. Djekic The role of this case study is to explain how it’s feasible to exploit some business assets using the IoT search engines and some hacking tools. […] The post The Case Study: The Exploitation of Business…
Combatting Social Engineering – The Invisible Threat
By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology […] The post Combatting Social Engineering – The Invisible Threat…
Cyber Strategy Is Not a Synonym for Tech Stack
By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid. Losing can mean going out of business. The cars, marvels […] The post Cyber Strategy Is Not a Synonym for…
Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket
Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices have become indispensable companions in our daily lives, offering us […] The post Mobile Insecurity: Unmasking the Vulnerabilities in Your…