Chief Information Security Officers (CISOs) and Chief Security Officers (CSOs) face unprecedented pressures, not only from the evolving threat landscape but also from a legal environment that increasingly seeks to… The post Protecting CISOs and CSOs in an Era of…
Tag: Cyber Defense Magazine
Innovator Spotlight: Black Kite
The Invisible Threat: Reimagining Third-Party Risk Management Cybersecurity leaders are drowning in questionnaires while threat actors are swimming in data. The traditional approach to vendor risk management is broken, and… The post Innovator Spotlight: Black Kite appeared first on Cyber…
Expert Spotlight: Koushik Anand on IAM and PAM Excellence at Enterprise Scale
By Gary Miliefsky, Publisher With more than 80% of breaches involving stolen or misused credentials, identity is the control point that matters most. Koushik Anand helps enterprises secure digital identities… The post Expert Spotlight: Koushik Anand on IAM and PAM…
Innovator Spotlight: WitnessAI
WitnessAI Delivers Security for the AI Era In the AI era, innovation is moving fast. Unfortunately, this means that the risks associated with this movement are too. Malicious activities like… The post Innovator Spotlight: WitnessAI appeared first on Cyber Defense…
Innovator Spotlight: LastPass
LastPass Evolves Secure Access Experiences to Combat Shadow IT and AI Risks for CISOs Picture your organization humming along, with teams adopting new apps to boost efficiency. But beneath that… The post Innovator Spotlight: LastPass appeared first on Cyber Defense…
Bridging the Cybersecurity Talent Gap
There’s no doubt about it. Cybersecurity incidents are rising. In 2024, the FBI reported a 9% increase in ransomware complaints targeting critical U.S. infrastructure sectors, such as healthcare, manufacturing and government facilities…. The post Bridging the Cybersecurity Talent Gap appeared first on…
Digital Transformation Failures: A National Security Crisis in the Making
In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business and defense organizations alike, the ability to leverage the power of digital technologies… The post Digital Transformation Failures: A National Security Crisis in…
Securing Linux Systems in the Age of AI: Unified Security Strategies for Modern Enterprises
Introduction In the rapidly evolving landscape of cybersecurity, the integration of Artificial Intelligence (AI) has emerged as a transformative advancement. This is particularly true in the realm of Linux-based systems,… The post Securing Linux Systems in the Age of AI:…
Preparing for the EU’s DORA amidst Technical Controls Ambiguity
The financial sector is bracing for a significant shift in its digital landscape as the EU’s Digital Operational Resilience Act (DORA) prepares to take effect in January 2025. This new… The post Preparing for the EU’s DORA amidst Technical Controls…
Beyond Buzzwords: The Real Impact of AI on Identity Security
Artificial intelligence (AI) has become one of the most discussed technologies in recent years, often touted as the answer to many of today’s pressing challenges. In the cybersecurity space, especially… The post Beyond Buzzwords: The Real Impact of AI on…
Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets
Digital media created more opportunities for companies to engage with consumers than ever before, but such increased interconnectedness has a price. Attacks are becoming progressively advanced, targeting not only a… The post Beyond the Firewall: Protecting Your Marketing Department from…
A CISO’s Guide to Managing Cyber Risk in Healthcare
Now more than ever before, our healthcare data is under attack. Of all of the sensitive information available on the dark web, medical records are among the most expensive, costing on… The post A CISO’s Guide to Managing Cyber Risk in…
Why The Open Web Application Security Project (OWASP) Mobile Application Security (MAS) Project Is Critical
The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools which have recently been added to OWASP MAS, which provides… The post Why The Open Web Application Security Project (OWASP)…
The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats
Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and… The post The Critical Role of Sboms (Software Bill of…
Ransomware Tactics Are Shifting. Here’s How to Keep Up
It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums… The post Ransomware Tactics Are Shifting. Here’s How to Keep…
12 Ways to Protect Your Business from Hackers During Remote Work
Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%) expected to be working remotely by 2025. In fact, 42% of office employees have stated they would… The post 12 Ways to Protect Your Business from Hackers…
Boost Operational Resilience: Proactive Security with CORA Best Practices
On almost a monthly basis, the US Cybersecurity & Infrastructure Security Agency (CISA) publishes advisories about the latest cybersecurity risks, attacks and vulnerabilities to help organizations defend and protect themselves… The post Boost Operational Resilience: Proactive Security with CORA Best…
More Than Sales… How Brokers Can Play a Critical Role in Strengthening the USA’s National Cybersecurity
As cyber threats continue to rise, enterprises can rely on unexpected allies for support: their insurance brokers. Brokers are not only able to secure robust cyber insurance coverage, they are… The post More Than Sales… How Brokers Can Play a…
Using Artificial Intelligence for Strengthening Email Security
Today, email-based attacks are increasingly sophisticated, however artificial intelligence (AI) can offer vital defense. With AI use, organizations can counteract advanced phishing, ransomware, and business email compromise (BEC) schemes that… The post Using Artificial Intelligence for Strengthening Email Security appeared…
Innovator Spotlight: Oleria
Identity’s New Frontier: How CISOs Can Navigate the Complex Landscape of Modern Access Management The cybersecurity battlefield has shifted. No longer are perimeter defenses and traditional identity management sufficient to… The post Innovator Spotlight: Oleria appeared first on Cyber Defense…