Tag: Cyber Defense Magazine

Ransomware Tactics Are Shifting. Here’s How to Keep Up

It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums… The post Ransomware Tactics Are Shifting. Here’s How to Keep…

Using Artificial Intelligence for Strengthening Email Security

Today, email-based attacks are increasingly sophisticated, however artificial intelligence (AI) can offer vital defense. With AI use, organizations can counteract advanced phishing, ransomware, and business email compromise (BEC) schemes that… The post Using Artificial Intelligence for Strengthening Email Security appeared…

Innovator Spotlight: Oleria

Identity’s New Frontier: How CISOs Can Navigate the Complex Landscape of Modern Access Management The cybersecurity battlefield has shifted. No longer are perimeter defenses and traditional identity management sufficient to… The post Innovator Spotlight: Oleria appeared first on Cyber Defense…

Innovator Spotlight: Straiker

The AI Security Frontier: Protecting Tomorrow’s Digital Landscape Cybersecurity leaders are facing an unprecedented challenge. As artificial intelligence transforms how organizations operate, a new breed of security solutions is emerging… The post Innovator Spotlight: Straiker appeared first on Cyber Defense…

Innovator Spotlight: Xcape

Continuous Vulnerability Management: The New Cybersecurity Imperative Security leaders are drowning in data but starving for actionable insights. Traditional penetration testing has become a snapshot of vulnerability that expires faster… The post Innovator Spotlight: Xcape appeared first on Cyber Defense…

Innovator Spotlight: Corelight

The Network’s Hidden Battlefield: Rethinking Cybersecurity Defense Modern cyber threats are no longer knocking at the perimeter – they’re already inside. The traditional security paradigm has fundamentally shifted, and CISOs… The post Innovator Spotlight: Corelight appeared first on Cyber Defense…

Exploring Key Technology Trends for 2024

Fast forward to today, and the importance of staying current with the latest tech trends can’t be overstated – it’s the difference between thriving and struggling to keep up. Professionals… The post Exploring Key Technology Trends for 2024 appeared first…

Software Supply Chain Attacks

In today’s rapidly evolving business landscape, software supply chain attacks are becoming increasingly common—and more sophisticated. The XZ backdoor attack, though largely contained, served as a stark reminder that the… The post Software Supply Chain Attacks appeared first on Cyber…

Innovator Spotlight: Seraphic

Reinventing Browser Security for the Enterprise The Browser: Enterprise’s Biggest Blind Spot On any given day, the humble web browser is where business happens – email, SaaS apps, file sharing,… The post Innovator Spotlight: Seraphic appeared first on Cyber Defense…

Innovator Spotlight: Darwinium

The Digital Battlefield: How AI is Reshaping Cybersecurity and Fraud Prevention Crocodiles aren’t the only predators lurking in the shadows anymore. Today’s most dangerous hunters wear digital camouflage, wielding artificial… The post Innovator Spotlight: Darwinium appeared first on Cyber Defense…

Finding Agility in Post Quantum Encryption (PQC)

In an era where data security is paramount, current encryption algorithms are sufficient to safeguard sensitive information. However, the advent of quantum computing, especially in the hands of malicious actors,… The post Finding Agility in Post Quantum Encryption (PQC) appeared…