Author Description

Gary M

Author Posts

Operation Eligible Receiver – The Birthplace of Cybersecurity: Vulnerabilities

More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose…

Beyond GDPR: key cyber security concerns

GDPR has now been in force for over two months and has brought with it a whole…

FOUR CONCRETE WAYS THREAT INTELLIGENCE CAN MAKE ORGANIZATIONS SAFER

by Jonathan Zhang, Founder and CEO, Threat Intelligence Platform, A Cyber Defense Magazine Exclusive Thought Leadership Article …

Some of the world’s biggest crimes go unnoticed, until it’s too late

As the way we live and work becomes increasingly sophisticated, complex and connected, the benefits are clear…

Breaking Down the Door to Emergency Services through Cellular IoT Gateways

If configured incorrectly, cellular IoT gateways can give attacker access to critical infrastructure, threatening human life in…

BAE Systems to Develop Automated Cyber Defense Tools for DARPA

By combining advanced machine learning and cyber-attack modeling, BAE Systems’ unique solution intends to automatically detect and…

BREAKING NEWS: NETSCOUT Threat Intelligence Report Highlights Evolution of Internet Scale Threats

NETSCOUT SYSTEMS, INC., (NASDAQ: NTCT), a leading provider of service assurance, security, and business analytics, today released its 2018 NETSCOUT Threat…

Breaking News: CYBERSECURITY MID-YEAR REVIEW | 1H 2018

Momentum Cyber is proud to release our Cybersecurity Mid-year Review for 2018. The mid-year report examines 1H’18 cybersecurity transactions…

Are Your File Transfers Compliant with Data Security Laws?

It can be challenging to keep up with ever-changing compliance requirements. This year alone, PCI DSS released…

BlackHat 2018: Easily Hacking Cars, Voting Machines, Satellites and Much More!

Black Hat USA now taking place August 4-9, 2018 at the Mandalay Bay Convention Center, offering the…

Show Buttons
Hide Buttons