Author Description

Gary M

Author Posts

Automated STIG “Hardening” Finally Comes to Government IT

For the thousands of hard-working men and women responsible for securing government IT networks to the Defense…

RSA Conference: $900 discount—last day for sweet deal!

Just like chocolate and flowers, our special Valentine’s Day discount is a limited-time treat. But one thing…

Shattered! Security in a Fragmented World of Workloads

by Satyam Tyagi, Director Product Management, ColorTokens Inc. Look at me, I’m in tatters! Don’t you know…

CBS News Exclusive: Hackers are stealing millions of medical records – and selling them on the dark web

As health care providers store patients’ medical records digitally, some have left their files vulnerable to being…

Want to Secure Your Endpoints? Go Beyond the Endpoint

by Jai Balasubramaniyan, Director of Product Management, ColorTokens Inc. Traditional endpoint security control has always been about…

QuadrigaCX Cryptocurrency Exchange — Password or Death Fail?

Special to Cyber Defense Magazine By Yan Ross News has been coming in this week with many…

Executives Taking the Cybersecurity Wheel at Regent University

Executives are equipped to take the cyber wheel at Regent’s C-suite workshops In today’s lightning-paced world of…

Free eBook: Mastering Linux Security and Hardening ($23 Value) FREE For a Limited Time

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. This book…

Operation Eligible Receiver 97’s Impact on Ransomware

In 1997, the NSA conducted an organized attack on the Department of Defense’s critical information systems, an…

Security – Being Proactive vs. Reactive

by Amit Ashbel, Security Evangelist at Cognigo In today’s IT market, no other sector is currently as…

Show Buttons
Hide Buttons