Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the […] The post How to interpret the 2023 MITRE ATT&CK…
Tag: Cyber Defense Magazine
Publishers Spotlight: Omdia Research Risk-based Vulnerability Management Findings
Omdia research finds risk-based vulnerability management set to encompass the vulnerability management market by 2027 The first comparative research into the evolution of the vulnerability management market authored by Omdia […] The post Publishers Spotlight: Omdia Research Risk-based Vulnerability Management…
Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs
CyTwist has launched its Preemptive Cyber Attack Management Platform (PCAM) to enable defenders to expose attacks early and accurately while creating efficiencies in the SOC. They are building a platform […] The post Publishers Spotlight: CyTwist: Defend Forward – Stop…
How Ai Can Be Used as A Tool to Help Monitor for Cybercrimes and Keep Kids Safe From Cyberbullying And Scams
By Ron Kerbs, CEO of Kidas Machine learning (ML) and classifiers have been used as cybersecurity tools for years. Starting in the 1990s, machine learning techniques began detecting known attacks […] The post How Ai Can Be Used as A…
Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection
Dataminr delivers the earliest warnings on high impact events, emerging risks, threats, and other critical information far in advance of other sources. Recognized as one of the world’s leading AI […] The post Publisher’s Spotlight: Dataminr: Real-time AI for Event…
Adaptive DDoS Attacks Get More Sophisticated: How to Beat Attackers’ New Ground Game
By Gary Sockrider, Director, Security Solutions, NETSCOUT The rapid expansion of Internet of Things (IoT) devices, which now number in the billions, not to mention upgrades to network infrastructure and […] The post Adaptive DDoS Attacks Get More Sophisticated: How…
Blockchain Technology: Strengthening Cybersecurity and Protecting Against Password Leaks and Data Breaches
By Thomas Carter, CEO, True I/O In today’s digital landscape, the frequency and severity of password leaks and data breaches have reached unprecedented levels. These incidents pose significant financial and […] The post Blockchain Technology: Strengthening Cybersecurity and Protecting Against…
Bridging the Widening Gap in Cybersecurity Talent: Addressing the Urgent Need for Skilled Professionals
By Travis Doe, Marketing Executive, Secure IT Consult Introduction In today’s digital age, where technology is deeply integrated into our personal and professional lives, the importance of cybersecurity cannot be […] The post Bridging the Widening Gap in Cybersecurity Talent:…
Publisher’s Spotlight: F5: Multi-Cloud Security and Application Delivery
F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations […] The post Publisher’s Spotlight: F5: Multi-Cloud Security and Application…
Boost Your Business Security: How Cyber Insurance Shields You from Cyber Threats
By Simon Pascoe, Director, FD Beck Insurance Brokers As the digital landscape evolves, cyber threats have become a significant concern for all businesses. Protecting your business from these risks is […] The post Boost Your Business Security: How Cyber Insurance…
Has MFA Had Its Day?
By Ori Arbel, CTO, CYREBRO Multi-factor authentication (MFA) has become the authentication standard for nearly all types of businesses – from banks to bicycle rentals and everything in between. Yet, […] The post Has MFA Had Its Day? appeared first…
From AI-driven Defense to Dark Web Threat Intelligence
How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […] The post From AI-driven Defense to Dark Web Threat…
Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio
When it comes to cybersecurity, the landscape is full of single-solution providers, making it easy for unexpected cyberthreats to sneak through the cracks. Fortra is creating a stronger, simpler strategy […] The post Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio appeared…
Cyber: Dealing with a Data Breach
Data breaches are one of the most significant cyber threats organizations face, but when they occur, many businesses do not respond in a manner that reassures their clients or the […] The post Cyber: Dealing with a Data Breach appeared…
AI In Cybersecurity – Risks and Rewards
By Aimei Wei, Co-Founder and CTO, Stellar Cyber The global cybersecurity workforce grew to a record 4.7 million people in 2022, according to an (ISC)2 2022 workforce study, but the same […] The post AI In Cybersecurity – Risks and Rewards…
Publisher’s Spotlight: IANS: Providing Expert Guidance to CISOs and their Teams
IANS Research has been working for the last two decades to create a way for InfoSec practitioners to collaborate in ways that are often difficult in other settings. The IANS […] The post Publisher’s Spotlight: IANS: Providing Expert Guidance to…
The Best of Both Worlds Made Possible with A Hybrid SOC
By Chase Richardson, Principal Lead Consultant, Bridewell The revolving door of cyber-attacks on major organizations continues to turn. Among the most significant of breaches over the last year was a […] The post The Best of Both Worlds Made Possible…
The Role of AI in Cybersecurity
By Alysia Silberg, CEO, Street Global As technology increasingly connects us, people, businesses, and governments are more concerned with Cybersecurity than ever before. The development of Artificial Intelligence (AI) provides […] The post The Role of AI in Cybersecurity appeared…
Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance Program
RegScale is a Modern GRC platform, delivering a simplified, integrated and scalable solution to meet the speed and real-time demands of the digital enterprise. The current manual and document-based approach […] The post Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance…
Publisher’s Spotlight: Security Journey: Secure Coding Training
Security Journey is a secure coding education provider that is focused on addressing the evolving landscape of cybersecurity threats with comprehensive and engaging training. As security awareness has become a […] The post Publisher’s Spotlight: Security Journey: Secure Coding Training…