Tag: Cyber Defense Magazine

Combatting Social Engineering – The Invisible Threat

By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one popular cyber-attack method known as social engineering leverages human psychology […] The post Combatting Social Engineering – The Invisible Threat…

Cyber Strategy Is Not a Synonym for Tech Stack

By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid. Losing can mean going out of business. The cars, marvels […] The post Cyber Strategy Is Not a Synonym for…

Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket

Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices have become indispensable companions in our daily lives, offering us […] The post Mobile Insecurity: Unmasking the Vulnerabilities in Your…

Beyond Mere Compliance

Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and sprinkler systems merely because their installation is required by local […] The post Beyond Mere Compliance appeared first on Cyber…

Stronger Together: Attack Surface Management and Security Validation

By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as cyberattacks increase in both frequency and severity. The average is […] The post Stronger Together: Attack Surface Management and Security…

How to Overcome the Most Common Challenges with Threat Intelligence

By David Monnier, Chief Evangelist, Team Cymru Fellow What would be your ideal approach to protecting your organization? Knowing exactly what threats are targeting your organization, well before those adversaries […] The post How to Overcome the Most Common Challenges…

The Persistent Danger of Remcos RAT

By Dilpreet Singh Bajwa, Senior Consultant, Cyfirma Executive Summary At Cyfirma, we are dedicated to providing you with up-to-date information on the most prevalent threats and tactics used by malicious […] The post The Persistent Danger of Remcos RAT appeared…

Forging A New Era of Invoicing Security

How blockchain-powered software is preventing cyber attacks By Ramon AB, CEO and Co-Founder of Nova Technology Invoicing may not be the first thing that pops up in a conversation around […] The post Forging A New Era of Invoicing Security…

Digital Criminal Ontology; Trading Pistols for Programmers

By James Allman Talbot, Head of Incident Response & Threat Intelligence, Quorum Cyber Since computers were first connected with Ethernet cables, Hollywood started romanticizing hackers. In 1983, WarGames was released. […] The post Digital Criminal Ontology; Trading Pistols for Programmers…

AI in Cybersecurity

Separating Hype from Hyperbole By Avkash Kathiriya “Artificial Intelligence in cybersecurity is like a supercharged virtual fortress armed with a gazillion laser-focused cyber warriors, ready to annihilate any threat with […] The post AI in Cybersecurity appeared first on Cyber…

Cybersecurity Is Changing: Is the Experience Positive or Negative?

By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies Cybersecurity is Changing: Is the Experience Positive or Negative? Unfortunately, cybersecurity and cybercrime represent the age-old Hollywood trope famously […] The post Cybersecurity Is Changing: Is the Experience Positive…

The Emergence of AI In the Enterprise: Know the Security Risks

By John Anthony Smith, CEO Conversant Group, and Eli Nussbaum, Managing Director, Conversant Group As businesses strive to keep up with the rapid pace of technological advancement, many are turning […] The post The Emergence of AI In the Enterprise:…

The Human Firewall: Strengthening the Weakest Link in Cybersecurity

By Steve Soukup, CEO, DefenseStorm Innovative technology has revolutionized the way we work and live by unlocking a wealth of new capabilities. As artificial intelligence makes daily operations more efficient […] The post The Human Firewall: Strengthening the Weakest Link…

The Rising Tide of Cybercrime as A Service (CaaS)

By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which, quite alarmingly, is like an online marketplace for cybercriminals and […] The post The Rising Tide of Cybercrime as A…

The Embedded Systems and The Internet of Things

By Milica D. Djekic The Internet of Things (IoT) is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This […] The post The Embedded Systems and The Internet of…

Increase In Mobile Threats Calls for A Proactive Mindset.

By Nicole Allen, Senior Marketing Executive at Salt Communications Mobile threats are always evolving in the world of business. Threats to mobile security are increasing: More than 60% of cyber […] The post Increase In Mobile Threats Calls for A…

Halting Hackers on the Holidays 2023

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive […] The post Halting Hackers on the Holidays 2023 appeared…

Navigating the Uncertainties of CMMC 2.0: An Urgent Call for Clarity

Unpacking the Complexities, Implications, and Future Outlook of the Cybersecurity Maturity Model Certification By David Brewer, Director of IT/Cybersecurity (Acting), Saalex Solutions, a division of Saalex Corporation In the hyperconnected […] The post Navigating the Uncertainties of CMMC 2.0: An…

IT Modernization Efforts Need to Prioritize Cybersecurity

By Mark Marron, CEO and President, ePlus, Inc. Organizations are increasingly advancing their digital transformation efforts to deliver internal efficiencies, reduce costs, and improve customer experiences. As a side-effect of […] The post IT Modernization Efforts Need to Prioritize Cybersecurity…

How to Avoid Common Security Incidents in the Public Cloud

By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the global spending on public cloud services was around $490.3 billion […] The post How to Avoid Common Security Incidents in…

E-mail Compromise

How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of the most beloved cybercriminals’ method for compromise of organization’s data. […] The post E-mail Compromise appeared first on Cyber Defense…

IP network security in the age of DDoS and quantum computing

By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to address the global broadband divide, continued digital transformation with the […] The post IP network security in the age of…

4 Key Security Challenges to Address with Confidential Computing

Confidential Computing delivers a variety of security benefits and helps deliver a platform for controlled, compliant activation of sensitive data By Simon Johnson, Senior Principal Engineer at Intel Over the […] The post 4 Key Security Challenges to Address with…

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […] The post Institutionalizing Awareness to Stop Cyberattacks appeared first…

There Are Cyberheroes: THE VIGILANCE MANIFESTO

A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI In the vast expanse of the digital realm, where shadows […] The post There Are Cyberheroes: THE VIGILANCE MANIFESTO appeared…

Who are the Wagner PMCs of Russia

Is There a Risk of Cyber Fallout? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Executive Summary At the end of June, a Russian mercenary organization known as ‘Wagner’ has mutinied […] The post Who are the Wagner PMCs of Russia…

Quantum Security is National Security

By Andy Manoske, Principal Product Manager of Cryptography and Security Products at HashiCorp Quantum computers will be one of the defining frontiers in computing over the next century. Utilizing the […] The post Quantum Security is National Security appeared first…

A New Ai Arms Race

By Alex Fink, CEO of the Otherweb The internet has seen its share of arms races in recent decades. The advent of viruses resulted in an ongoing battle between those […] The post A New Ai Arms Race appeared first…

6 Steps to Accelerate Cybersecurity Incident Response

Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must […] The post 6 Steps to Accelerate Cybersecurity Incident Response…

Fend Off the Next Phishing Attack With A “Human Firewall.”

Implement the ‘Mindset – Skillset – Toolset’ triad By Dr. Yvonne Bernard, CTO, Hornetsecurity Spear phishing continues to be the most popular cyberattack, and those companies without proper cybersecurity measures […] The post Fend Off the Next Phishing Attack With…

8 Tips for Best Results in Red-Teaming

By Zac Amos, Features Editor, ReHack In cybersecurity, a red team exercise is a unique way to ensure businesses can respond to cyberattacks appropriately. While it’s generally beneficial, taking extra […] The post 8 Tips for Best Results in Red-Teaming…

Simplifying your Approach to the Zero Trust Journey

By Chris Cullerot, Director of Technology and Innovation, iTech AG Earlier this year, the Cybersecurity and Infrastructure Security Agency released its Zero Trust Maturity Model 2.0 to help agencies develop […] The post Simplifying your Approach to the Zero Trust…

Digital Accessibility and Cybersecurity Must Go Hand in Hand

By Dr. Chris Olson In an Increasingly Digital World, Accessibility and Cybersecurity Have Emerged as Significant Factors for Both Individuals and Organizations. Digital accessibility refers to the design and development […] The post Digital Accessibility and Cybersecurity Must Go Hand…

Six Tips to Ensure a Strong Patch Management Strategy

By Ashley Leonard, CEO and Founder, Syxsense The proliferation of software applications and updates across the market today has put pressure on enterprise security teams to implement strong patch management […] The post Six Tips to Ensure a Strong Patch…

Three Ways to Protect the Data Powering Summer Vacations

By Amit Shaked, CEO and Co-Founder, Laminar The travel industry is in the midst of rapid recovery following the COVID-19 pandemic. In 2022, there were over 747 million passengers who […] The post Three Ways to Protect the Data Powering…

Publishers Spotlight: Nisos: Your Managed Intelligence Partner

Nisos is the Managed Intelligence™ team you need to consider working with to solve your most complex security challenges. They deliver smarter defense and more effective responses against advanced cyber […] The post Publishers Spotlight: Nisos: Your Managed Intelligence Partner…

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the […] The post How to interpret the 2023 MITRE ATT&CK…

Publisher’s Spotlight: F5: Multi-Cloud Security and Application Delivery

F5 is a multi-cloud application services and security company committed to bringing a better digital world to life.​​​​​​​ F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations […] The post Publisher’s Spotlight: F5: Multi-Cloud Security and Application…

Has MFA Had Its Day?

By Ori Arbel, CTO, CYREBRO Multi-factor authentication (MFA) has become the authentication standard for nearly all types of businesses – from banks to bicycle rentals and everything in between. Yet, […] The post Has MFA Had Its Day? appeared first…

From AI-driven Defense to Dark Web Threat Intelligence

How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […] The post From AI-driven Defense to Dark Web Threat…

Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio

When it comes to cybersecurity, the landscape is full of single-solution providers, making it easy for unexpected cyberthreats to sneak through the cracks. Fortra is creating a stronger, simpler strategy […] The post Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio appeared…

Cyber: Dealing with a Data Breach

Data breaches are one of the most significant cyber threats organizations face, but when they occur, many businesses do not respond in a manner that reassures their clients or the […] The post Cyber: Dealing with a Data Breach appeared…

AI In Cybersecurity – Risks and Rewards

By Aimei Wei, Co-Founder and CTO, Stellar Cyber The global cybersecurity workforce grew to a record 4.7 million people in 2022, according to an (ISC)2 2022 workforce study, but the  same […] The post AI In Cybersecurity – Risks and Rewards…

The Best of Both Worlds Made Possible with A Hybrid SOC

By Chase Richardson, Principal Lead Consultant, Bridewell The revolving door of cyber-attacks on major organizations continues to turn. Among the most significant of breaches over the last year was a […] The post The Best of Both Worlds Made Possible…

The Role of AI in Cybersecurity

By Alysia Silberg, CEO, Street Global As technology increasingly connects us, people, businesses, and governments are more concerned with Cybersecurity than ever before. The development of Artificial Intelligence (AI) provides […] The post The Role of AI in Cybersecurity appeared…

Publisher’s Spotlight: Security Journey: Secure Coding Training

Security Journey is a secure coding education provider that is focused on addressing the evolving landscape of cybersecurity threats with comprehensive and engaging training. As security awareness has become a […] The post Publisher’s Spotlight: Security Journey: Secure Coding Training…

Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection

CrowdSec is a modern, collaborative cybersecurity company committed to proactively safeguarding digital assets. With a growing community of 65,000+ active installations contributing to a robust, constantly-updated global IP reputation database […] The post Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection…

The Other Russian War – What Can We Do?

Russian hacking efforts have highlighted weaknesses in U.S. cybersecurity infrastructure. By Jamie Eiseman, George Washington University Russia is invading Ukraine, and Russian hackers are attacking the United States. In October, […] The post The Other Russian War – What Can…

Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter

Today’s cyber attackers are looking beyond network systems and devices to target organizations through digital platforms outside your perimeter. It’s time to detect, expose, and disrupt these external threats to […] The post Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your…