by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive […] The post Halting Hackers on the Holidays 2023 appeared…
Tag: Cyber Defense Magazine
Navigating the Uncertainties of CMMC 2.0: An Urgent Call for Clarity
Unpacking the Complexities, Implications, and Future Outlook of the Cybersecurity Maturity Model Certification By David Brewer, Director of IT/Cybersecurity (Acting), Saalex Solutions, a division of Saalex Corporation In the hyperconnected […] The post Navigating the Uncertainties of CMMC 2.0: An…
IT Modernization Efforts Need to Prioritize Cybersecurity
By Mark Marron, CEO and President, ePlus, Inc. Organizations are increasingly advancing their digital transformation efforts to deliver internal efficiencies, reduce costs, and improve customer experiences. As a side-effect of […] The post IT Modernization Efforts Need to Prioritize Cybersecurity…
From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies
By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security concept in the early 2000s, it was largely focused on […] The post From Network Perimeters to Cloud Access Security…
How to Avoid Common Security Incidents in the Public Cloud
By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the global spending on public cloud services was around $490.3 billion […] The post How to Avoid Common Security Incidents in…
E-mail Compromise
How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of the most beloved cybercriminals’ method for compromise of organization’s data. […] The post E-mail Compromise appeared first on Cyber Defense…
IP network security in the age of DDoS and quantum computing
By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to address the global broadband divide, continued digital transformation with the […] The post IP network security in the age of…
Earthquakes, Cyber Breaches, and Mitigating Disasters through Design
By Archie Agarwal, Founder and CEO of ThreatModeler The Great Earthquake of San Francisco in 1906 caused unbelievable levels of damage in the city, with over 28,000 buildings destroyed and […] The post Earthquakes, Cyber Breaches, and Mitigating Disasters through…
Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market
The health IT security market is experiencing remarkable growth, driven by the pressing need for robust solutions that protect patient privacy, secure data integrity, and ensure the uninterrupted delivery of […] The post Safeguarding Healthcare: A Closer Look at the…
Post-Quantum Cryptography: Safeguarding the Digital Future and Bolstering Security in Critical Sectors
By Maila Zahra, Air University Islamabad and Zia Muhammad, North Dakota State University Post-quantum cryptography aims to develop secure cryptographic algorithms to protect against most quantum attacks. The threats of […] The post Post-Quantum Cryptography: Safeguarding the Digital Future and…
With Americans Traveling More Than Ever Before, It’s Time Businesses Increase Their Mobile Security Efforts
If your colleagues are working from the road, follow these five steps to strengthen your mobile cybersecurity initiatives. By George Tubin, Director of Product Strategy, Cynet The U.S. travel market […] The post With Americans Traveling More Than Ever Before,…
Guarding Against the Insider Threat: Do Your Employees Pose the Greatest Risk?
By Moty Kanias, VP of Cyber Strategy & Alliances, NanoLock Security Great businesses understand that their people are their most important assets. But there is another side to that coin. […] The post Guarding Against the Insider Threat: Do Your…
National Cyber Security Vulnerabilities in The Changing Security Environment
Implications For the Resilience of The NATO Cyber and Information Space By Georgi Atanasov, Subject Matter Expert in Bulgarian ministry of defense In the changed security environment states are seeking […] The post National Cyber Security Vulnerabilities in The Changing…
Visibility Isn’t Enough; It’s What You Do with It That Counts
By Christina Richmond, Chief Strategy and Growth Officer, Inspira Enterprise As cyber risks continue to grow and evolve (here’s looking at you, generative AI) – more and more vulnerabilities are […] The post Visibility Isn’t Enough; It’s What You Do…
4 Key Security Challenges to Address with Confidential Computing
Confidential Computing delivers a variety of security benefits and helps deliver a platform for controlled, compliant activation of sensitive data By Simon Johnson, Senior Principal Engineer at Intel Over the […] The post 4 Key Security Challenges to Address with…
Four Years and a Pandemic Later: Have Agencies Become Cloud Smart?
By James Langley, Master Solutions Consultant, Hitachi Vantara Federal June 2023 marked the four-year anniversary of the release of the final Cloud Smart strategy, which was the government’s update to […] The post Four Years and a Pandemic Later: Have…
Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises
By Walt Szablowski, Founder and Executive Chairman, Eracent Summary: With the increasing frequency and sophistication of cyberattacks in the digital landscape, and the failure of legacy cybersecurity tools and methods, […] The post Embracing Zero Trust Architecture: A Critical Best…
How Google Play Store Security May Fail to Protect Users from Stealthy Malware
Incremental Malicious Update Attack (IMUTA) By Zia Muhammad and Zahid Anwar, Department of Computer Science, NDSU Android is the leading operating system in the smartphone industry with more than 71% […] The post How Google Play Store Security May Fail…
Institutionalizing Awareness to Stop Cyberattacks
By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…
Rethinking SASE: Why Migrate Cybersecurity from Cloud to Browser
By John “JP” Peterson, Chief Product Officer, High Wire Networks Cyberthreats are the scourge of our day. Few would argue, but there’s little consensus about what to do about it. […] The post Rethinking SASE: Why Migrate Cybersecurity from Cloud…