Artificial intelligence (AI) has become one of the most discussed technologies in recent years, often touted as the answer to many of today’s pressing challenges. In the cybersecurity space, especially… The post Beyond Buzzwords: The Real Impact of AI on…
Tag: Cyber Defense Magazine
Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets
Digital media created more opportunities for companies to engage with consumers than ever before, but such increased interconnectedness has a price. Attacks are becoming progressively advanced, targeting not only a… The post Beyond the Firewall: Protecting Your Marketing Department from…
A CISO’s Guide to Managing Cyber Risk in Healthcare
Now more than ever before, our healthcare data is under attack. Of all of the sensitive information available on the dark web, medical records are among the most expensive, costing on… The post A CISO’s Guide to Managing Cyber Risk in…
Why The Open Web Application Security Project (OWASP) Mobile Application Security (MAS) Project Is Critical
The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools which have recently been added to OWASP MAS, which provides… The post Why The Open Web Application Security Project (OWASP)…
The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats
Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and… The post The Critical Role of Sboms (Software Bill of…
Ransomware Tactics Are Shifting. Here’s How to Keep Up
It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums… The post Ransomware Tactics Are Shifting. Here’s How to Keep…
12 Ways to Protect Your Business from Hackers During Remote Work
Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%) expected to be working remotely by 2025. In fact, 42% of office employees have stated they would… The post 12 Ways to Protect Your Business from Hackers…
Boost Operational Resilience: Proactive Security with CORA Best Practices
On almost a monthly basis, the US Cybersecurity & Infrastructure Security Agency (CISA) publishes advisories about the latest cybersecurity risks, attacks and vulnerabilities to help organizations defend and protect themselves… The post Boost Operational Resilience: Proactive Security with CORA Best…
More Than Sales… How Brokers Can Play a Critical Role in Strengthening the USA’s National Cybersecurity
As cyber threats continue to rise, enterprises can rely on unexpected allies for support: their insurance brokers. Brokers are not only able to secure robust cyber insurance coverage, they are… The post More Than Sales… How Brokers Can Play a…
Using Artificial Intelligence for Strengthening Email Security
Today, email-based attacks are increasingly sophisticated, however artificial intelligence (AI) can offer vital defense. With AI use, organizations can counteract advanced phishing, ransomware, and business email compromise (BEC) schemes that… The post Using Artificial Intelligence for Strengthening Email Security appeared…
Innovator Spotlight: Oleria
Identity’s New Frontier: How CISOs Can Navigate the Complex Landscape of Modern Access Management The cybersecurity battlefield has shifted. No longer are perimeter defenses and traditional identity management sufficient to… The post Innovator Spotlight: Oleria appeared first on Cyber Defense…
Innovator Spotlight: Straiker
The AI Security Frontier: Protecting Tomorrow’s Digital Landscape Cybersecurity leaders are facing an unprecedented challenge. As artificial intelligence transforms how organizations operate, a new breed of security solutions is emerging… The post Innovator Spotlight: Straiker appeared first on Cyber Defense…
Innovator Spotlight: Xcape
Continuous Vulnerability Management: The New Cybersecurity Imperative Security leaders are drowning in data but starving for actionable insights. Traditional penetration testing has become a snapshot of vulnerability that expires faster… The post Innovator Spotlight: Xcape appeared first on Cyber Defense…
Innovator Spotlight: Corelight
The Network’s Hidden Battlefield: Rethinking Cybersecurity Defense Modern cyber threats are no longer knocking at the perimeter – they’re already inside. The traditional security paradigm has fundamentally shifted, and CISOs… The post Innovator Spotlight: Corelight appeared first on Cyber Defense…
Exploring Key Technology Trends for 2024
Fast forward to today, and the importance of staying current with the latest tech trends can’t be overstated – it’s the difference between thriving and struggling to keep up. Professionals… The post Exploring Key Technology Trends for 2024 appeared first…
Software Supply Chain Attacks
In today’s rapidly evolving business landscape, software supply chain attacks are becoming increasingly common—and more sophisticated. The XZ backdoor attack, though largely contained, served as a stark reminder that the… The post Software Supply Chain Attacks appeared first on Cyber…
Innovator Spotlight: Seraphic
Reinventing Browser Security for the Enterprise The Browser: Enterprise’s Biggest Blind Spot On any given day, the humble web browser is where business happens – email, SaaS apps, file sharing,… The post Innovator Spotlight: Seraphic appeared first on Cyber Defense…
Innovator Spotlight: Darwinium
The Digital Battlefield: How AI is Reshaping Cybersecurity and Fraud Prevention Crocodiles aren’t the only predators lurking in the shadows anymore. Today’s most dangerous hunters wear digital camouflage, wielding artificial… The post Innovator Spotlight: Darwinium appeared first on Cyber Defense…
Quantum Computing is Coming: Enterprises Need to Prepare Now
Quantum computing is coming. When? No one knows for sure. Some experts say 10 years, others say 15 to 20 years. Many believe quantum computers will be here even sooner…. The post Quantum Computing is Coming: Enterprises Need to Prepare…
Finding Agility in Post Quantum Encryption (PQC)
In an era where data security is paramount, current encryption algorithms are sufficient to safeguard sensitive information. However, the advent of quantum computing, especially in the hands of malicious actors,… The post Finding Agility in Post Quantum Encryption (PQC) appeared…