Tag: Cyber Defense Magazine

Mitigating Data Breaches with AI-Driven Security Solutions

SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes, even those equipped with robust security measures. As cybercriminals become… The post Mitigating Data Breaches with AI-Driven Security Solutions appeared…

The Dual Nature of Ransomware Attacks

Financial Gain and Geopolitical Strategy Ransomware attacks have evolved from mere cybercriminal activities to sophisticated operations serving dual purposes: financial gain for attackers and advancing the geopolitical objectives of adversarial… The post The Dual Nature of Ransomware Attacks appeared first…

The Other Lesson from the XZ Utils Supply-Chain Attack

“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in the case of the recent XZ Utils case, it was… The post The Other Lesson from the XZ Utils Supply-Chain…

Artificial Intelligence in 2024

Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so far as to call it the “revolution of work.” Unfortunately,… The post Artificial Intelligence in 2024 appeared first on Cyber…

Sheltering from the Cyberattack Storm

As we move towards the summer and the promise of sunnier weather, it’s worth noting that the cybersecurity industry has seen more rain than sunshine recently. A slew of high-profile… The post Sheltering from the Cyberattack Storm appeared first on…

How the Newest Tech Changes Cybersecurity Needs in the Legal Industry

Responsibly Adopting Technology to Improve Law Firm Productivity Lawyers face incredible pressure in their jobs to perform accurately and quickly. Thankfully, technology has been introduced that now allows legal professionals… The post How the Newest Tech Changes Cybersecurity Needs in…

5 Reasons IGA Programs Fail

Identity governance and administration (IGA) is a critical part of modern business. It’s one of the single most important pieces of creating and balancing a productive and secure work environment…. The post 5 Reasons IGA Programs Fail appeared first on…

The First 10 Days of a vCISOs Journey with a New Client

“In a quaint village nestled between rolling hills and dense forests, a young apprentice named Eli was learning to throw pottery from a master potter. On the first day by… The post The First 10 Days of a vCISOs Journey…

Digital Identities Have Evolved — Cyber Strategies Should Too

The scale of identity exposure has increased significantly, with over 90% of surveyed organizations reporting an identity-related breach within the last year. These attacks have long-lasting consequences – SpyCloud’s 2024 Identity Exposure Report found… The post Digital Identities Have Evolved — Cyber Strategies Should…

Stop Chasing the AI Squirrel and Patch… Just Patch

In the contemporary technological landscape, the allure of advanced artificial intelligence (AI) systems often captivates the collective imagination of the tech industry and beyond. Stories of deepfakes, such as the… The post Stop Chasing the AI Squirrel and Patch… Just…

Spotlight on DeepKeep.ai

DeepKeep, the leading provider of AI-Native Trust, Risk, and Security Management (TRiSM), empowers large corporations that rely on AI, GenAI, and LLM technologies to manage risk and protect growth. Our… The post Spotlight on DeepKeep.ai appeared first on Cyber Defense…

Security Threats Targeting Large Language Models

Evolving landscape of LLM Security The emergence of Large Language Models (LLMs) has revolutionized the capabilities of artificial intelligence, offering unprecedented potential for various applications. However, like every new technology,… The post Security Threats Targeting Large Language Models appeared first…

The Role of Human Error in Data Spillage Incidents

Unraveling Human Factors in Data Breaches Data spillage is a term used to describe the exposure of sensitive or classified information outside an organization’s designated boundary of network or safety… The post The Role of Human Error in Data Spillage…

The Morphing of Misinformation in a Super Election Year

Security a Top Concern During 2024 Election ‘Super-Cyle’ With an unprecedented ‘super-cycle’ of elections in 2024, almost half the world’s population will go to the polls before the year is… The post The Morphing of Misinformation in a Super Election…

Overcome AI-Oriented Phishing Attacks with These Sure-Fire Strategies

Artificial intelligence is an ever-evolving subject; year by year, its landscape is expanding to different industries, and the outcome of its optimization is noteworthy. One of the prominent tech giants,… The post Overcome AI-Oriented Phishing Attacks with These Sure-Fire Strategies…

Why the MoD Breach Calls for a Cybersecurity Overhaul

The recent cyber attack on the Ministry of Defence, which compromised the personal information of UK military personnel, serves as a stark warning for organisations across the globe and reinforces… The post Why the MoD Breach Calls for a Cybersecurity…

AI and Cybersecurity: Mitigating Risks and Safeguarding Digital Assets

Leveraging Artificial Intelligence to Enhance Cybersecurity Defenses Artificial Intelligence has become essential for safeguarding digital resources in cybersecurity. As organizations strive to defend against pragmatic threats, AI offers crucial risk… The post AI and Cybersecurity: Mitigating Risks and Safeguarding Digital…

RSA Conference 2024 Highlights: Cutting-Edge Cybersecurity Innovations

AI in Action: Real-World Breakthroughs and Innovations Attending the RSA Conference for the first time was an incredible experience! Ever since I began my journey in cybersecurity, attending the RSA… The post RSA Conference 2024 Highlights: Cutting-Edge Cybersecurity Innovations appeared…

The Scourge of Ransomware

Ransomware has become a growing threat in our new hybrid world. It encrypts a victim’s files, rendering them inaccessible, and demands a ransom payment for the decryption key. This can… The post The Scourge of Ransomware appeared first on Cyber…

Is Your Organization a Laggard or a Leader in Digital Trust?

By Mike Fleck, Head of Product Marketing at DigiCert Digital trust is at the core of what makes internet connected experiences valuable. Whether we’re making an e-commerce purchase, signing a […] The post Is Your Organization a Laggard or a…

Comparing MDR vs SIEM: Which Is Better for Your Business?

By Vira Shynkaruk, Cybersecurity Content Expert, UnderDefense Making the right call on cybersecurity solutions is paramount for businesses, especially now, when they are constantly under siege from cyberattacks. The critical […] The post Comparing MDR vs SIEM: Which Is Better…

Rogue Nations: An Assessment of State-Sponsored Cyberattacks.

By Jacques de la Riviere, CEO, Gatewatcher Few prefixes excite the cybersecurity market as much as ‘state-sponsored.’ The label immediately conjures images of well-equipped, highly-resourced teams targeting high-profile organisations and […] The post Rogue Nations: An Assessment of State-Sponsored Cyberattacks.…

The AI Arms Race Shaping Federal Cyber Resilience

By Gary Barlet, Federal Chief Technology Officer, Illumio At its core, the paradox of artificial intelligence (AI) in cybersecurity lies in conflicting uses. On one hand, malicious actors harness AI […] The post The AI Arms Race Shaping Federal Cyber…

A National Imperative – Cyber Resiliency

Strategies to Safeguard Critical Infrastructure Against Cyber Threats By Andrea E. Davis, Founder and President of The Resiliency Initiative I started my career in emergency management in 1999. At the […] The post A National Imperative – Cyber Resiliency appeared…

How and When to Know You Need a Fractional CISO

By Andy Hilliard, CEO of Accelerance Every business owner knows how important cyber security is. Headlines of attacks, leaks and breaches of customer data, payment information, intellectual property and more […] The post How and When to Know You Need…

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a huge iceberg: there is a hidden layer below the top. […] The post Understanding the Dark Web: What You Need…

Navigating the Perilous Waters of Supply Chain Cybersecurity

By Kenneth Moras Introduction: In today’s interconnected business environment, reliance on innovative vendors and open source solutions is inevitable. However, these supply chains also stand on the frontline in the […] The post Navigating the Perilous Waters of Supply Chain…

The Challenge of Combatting Threats Against Autonomous Vehicles

By Joseph Hladik, Cyber Group Lead, Neya Systems From perception and sensing to mapping and localization, both off-road and on-road autonomous vehicles rely heavily on software and connectivity to operate […] The post The Challenge of Combatting Threats Against Autonomous…

Emerging Technology Review and Needs

By Milica D. Djekic The progress distribution is a slow and time-consuming process that normally might take decades and sometimes centuries in order to deliver a betterment for many to […] The post Emerging Technology Review and Needs appeared first…

Spotlight on Scribe Security

By Dan K. Anderson vCISO and On-Call Roving Reporter, Cyber Defense Magazine In my travels and works one of the most difficult challenges for Security is achieving good relations and […] The post Spotlight on Scribe Security appeared first on…

Combating Cyber-attacks with Threat-Intelligence

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By Deboleena Dutta, Junior Content Writer, Research Nester In today’s digitally […] The post Combating Cyber-attacks with Threat-Intelligence appeared first on…

How to Design a Zero Trust Strategy for Remote Workers

By Federico Charosky, Founder and CEO, Quorum Cyber The modern workforce expects to work anywhere from any device. To support this approach investment is needed in a broader security program […] The post How to Design a Zero Trust Strategy…

The TikTok Ban Spells Trouble for Chinese IoT

What businesses should do today to prepare for likely bans across Chinese tech tomorrow By Carsten Rhod Gregersen, Founder and CEO of Nabto It’s happening. Following years of rumors, The […] The post The TikTok Ban Spells Trouble for Chinese…

AI Can Bridge the Gap of Ineffective MDR Tools

By Orion Cassetto, Head of Marketing, Radiant Security Last year, nearly one-third of organizations suffered breaches, prompting security professionals to reevaluate the performance of their existing managed detection and response […] The post AI Can Bridge the Gap of Ineffective…

Spotlight on Riskassure

Riskaware by Riskassure Solves a Unique Problem By Dan K. Anderson vCISO and On-Call Roving Reporter, CyberDefense Magazine In preparing for this article, I met with Larry Faragalli, Keith Huckaby, […] The post Spotlight on Riskassure appeared first on Cyber…

Applied Human Threat Management in Cyber Industry

By Milica D. Djekic The high-tech industry is an extremely emerging environment dealing with the sophisticated and skilled workforce that is recruited to develop an ultimate cutting-edge technology, so far. […] The post Applied Human Threat Management in Cyber Industry…

Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter

In the fast-moving age of artificial intelligence (AI), cybersecurity is more important than ever before. By Tyler Derr, Chief Technology Officer (CTO), Broadridge In the fast-moving age of artificial intelligence […] The post Cyber Resiliency in The Age Of AI:…

Limits of Automation

How Interactive Sandboxing Can Benefit Your Organization By Vlad Ananin, Technical Writer at Any.Run The current rate and complexity of cyber attacks are making it harder than ever for companies […] The post Limits of Automation appeared first on Cyber…

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to […] The post Why Do Hackers Love Cryptocurrency? appeared first…

Cryptographic Protocol Challenges

By Milica D. Djekic The communication protocol is an information exchange method where data are transferred only if two or more networking devices deal with a set of the rules […] The post Cryptographic Protocol Challenges appeared first on Cyber…

Cybersecurity Concerns Facing the 2024 U.S. Elections

By Zac Amos, Features Editor, ReHack Cybersecurity oversights are making infrastructure in the U.S. the most fragile it has been in history. Hackers are constantly developing new strategies to topple […] The post Cybersecurity Concerns Facing the 2024 U.S. Elections…

CES: AI at the Forefront of Cybersecurity’s Future

Examining the Increased Use of Artificial Intelligence in Cybersecurity By Matthew Taylor, Vice President of Projects and Engineering, MxD The annual Consumer Electronics Show (CES) is the world’s largest consumer […] The post CES: AI at the Forefront of Cybersecurity’s…

Why Millions of Pcs Aren’t Ready for Evolving Cyber Threats

By Achi Lewis, Area VP EMEA for Absolute Security Ongoing global security threats, underpinned by continuous fears by the White House and NCSC, require an urgent call to bolster security defenses […] The post Why Millions of Pcs Aren’t Ready for…

What Individuals Get Wrong About Business Email Compromise

Businesses tend to obsess over business email compromise. This obsession is misguided. Observations from the front lines of combating business email compromise at the SMB scale and what we should […] The post What Individuals Get Wrong About Business Email…

Relying on the Unreliable

The Hidden Costs of Facial Recognition Technology By Tinglong Dai Bernard T. Ferrari Professor of Business The Carey Business School at Johns Hopkins University With generative AI dominating the tech […] The post Relying on the Unreliable appeared first on…

Keeping Pace with an Evolving Security and Trust Landscape

By Dean Coclin, Senior Director, Digital Trust Specialist, DigiCert It’s clear that 2023 will be remembered as the point that artificial intelligence (AI) stepped out of the shadows and took […] The post Keeping Pace with an Evolving Security and…

How Main Street Businesses Can Up Their Cybersecurity Game

By Mike Caralis, Vice President, Business Markets at Verizon Small businesses are not only essential in keeping Main Street thriving and bustling (I love my local sushi place), but they […] The post How Main Street Businesses Can Up Their…

CTI for M&A

Active dark web Intelligence to aid M&A  By Shawn Loveland, COO, Resecurity Every industry-leading company has gone through mergers and acquisitions (M&A) at some point to acquire a competitor, expand […] The post CTI for M&A appeared first on Cyber…

Is Zero Trust Enough?

Why Zero Access Is a Better Way To Protect Your Backup Infrastructure By Greg Tevis, Vice President of Strategy, Cobalt Iron Backup has always been seen as the last line […] The post Is Zero Trust Enough? appeared first on…

Full Drive Encryption Only a Half-Measure for Data Security

Pre-Boot Authentication Is the Missing Half By John Benkert, Cigent CEO and Co-founder In an era where data security breaches are not just incidents but an event that can topple […] The post Full Drive Encryption Only a Half-Measure for…

Beyond Code: Harnessing AI for Advanced Cybersecurity Solutions

By Angel Vossough, Co-Founder & CEO of BetterAI.io Cybersecurity defenses are shifting, aiming to predict and block cyber threats in advance, acting as digital guardians attempting to stay one step […] The post Beyond Code: Harnessing AI for Advanced Cybersecurity…

Best Password Generators of 2024 to Secure Your Accounts

Overview of best password generators to secure online accounts By Mia Naumoska, CMO at Internxt Despite the current advances in technology, one thing that has stood the test of time […] The post Best Password Generators of 2024 to Secure…

Becoming Resilient to The Cyber Incidents of Today And Tomorrow

By Theresa Le, Chief Claims Officer, Cowbell As cyber threats escalate and evolve worldwide, businesses must ensure their foundations are solid to withstand potential cyber incidents. Developing organizational resilience involves […] The post Becoming Resilient to The Cyber Incidents of…

6 Factors to Consider When Choosing a SIEM Solution

Don’t Settle for Less | Make an Informed Decision By Krunal Mendapara, Chief Technology Officer, Sattrix Group In today’s world, cyber threats are more rampant than ever before. It’s no […] The post 6 Factors to Consider When Choosing a…

2024: The Year of Secure Design

By Stephen de Vries, CEO, IriusRisk In 2023, we saw governments and global cybersecurity agencies begin to put the building blocks in place for secure design and take cyber defense […] The post 2024: The Year of Secure Design appeared…

Fortifying Digital Health Against Cyber Attacks

By Nissim Ben-Saadon, Director of Innovation, CYREBRO In today’s digital era, the healthcare industry stands at the forefront of technological adoption, heavily relying on digital systems such as Electronic Health […] The post Fortifying Digital Health Against Cyber Attacks appeared…

Strengthening Cyber Defense with Threat Intelligence Operations

By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to […] The post Strengthening Cyber Defense with Threat Intelligence Operations…

Cybersecurity or Cyber Resilience: Which Matters More?

Planning Beyond an Enterprise Security Posture and Toward Reliable Business Continuity By Amanda Satterwhite, Managing Director of Cyber Growth & Strategy, Accenture Federal Services Cybercrimes in the United States have […] The post Cybersecurity or Cyber Resilience: Which Matters More?…

Will We Ever See Federal Data Breaches End Entirely?

Government cybersecurity may get worse before it gets better. By April Miller, Managing Editor, ReHack Magazine Data breaches are a problem in virtually every industry. However, they carry extra weight […] The post Will We Ever See Federal Data Breaches…

Why Is Hardware More Secure than Software?

The underlying differences between hardware and software when implementing critical cryptosystems. By Kimmo Järvinen, Co-founder and CTO, Xiphera The majority of today’s cryptographic implementations rely on software running on general-purpose […] The post Why Is Hardware More Secure than Software?…