Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure
by Lena Allen Introduction In this era of unprecedented technological interconnectedness, the safeguarding of critical infrastructure against cyber threats has ascended to a pinnacle of national security importance for the […]
OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft
Securing Operational Technology ACCESS THE RECORDING Kick-start your OT security program, wherever you are in your journey. Gain industry-specific insights into OT cybersecurity challenges and equip yourself with practical strategies […]
Halting Hackers on the Holidays 2023
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive […]
Publishers Spotlight: The Syndicate Group (TSG)
The Syndicate Group (TSG) is a leading venture firm focused on revenue growth and new customer acquisition. Leveraging an ecosystem of strategic investors including more than 450 leading channel partner […]
Spotlight: Whitepaper: Information security for the medical device industry
With a focus on the medical device industry, this paper provides software developers, hardware developers, and manufacturers with an understanding of the necessity and benefits of cybersecurity preparedness that can […]
Passive Optical Networks: A Game Changer for Now And The Future
By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC The Department of Defense (DoD) faces challenges in meeting network […]
Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot
Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through unlimited in-depth investigation, and rapidly respond to incidents. Radiant Security […]
Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection
Dataminr delivers the earliest warnings on high impact events, emerging risks, threats, and other critical information far in advance of other sources. Recognized as one of the world’s leading AI […]
Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio
When it comes to cybersecurity, the landscape is full of single-solution providers, making it easy for unexpected cyberthreats to sneak through the cracks. Fortra is creating a stronger, simpler strategy […]
Publisher’s Spotlight: IANS: Providing Expert Guidance to CISOs and their Teams
IANS Research has been working for the last two decades to create a way for InfoSec practitioners to collaborate in ways that are often difficult in other settings. The IANS […]
Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance Program
RegScale is a Modern GRC platform, delivering a simplified, integrated and scalable solution to meet the speed and real-time demands of the digital enterprise. The current manual and document-based approach […]
Publisher’s Spotlight: Security Journey: Secure Coding Training
Security Journey is a secure coding education provider that is focused on addressing the evolving landscape of cybersecurity threats with comprehensive and engaging training. As security awareness has become a […]
Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model
Arctic Wolf is a global leader in security operations, enabling customers to manage their cyber risk in the face of modern cyberattacks. Our Arctic Wolf Security Operations Cloud ingests and […]
Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection
CrowdSec is a modern, collaborative cybersecurity company committed to proactively safeguarding digital assets. With a growing community of 65,000+ active installations contributing to a robust, constantly-updated global IP reputation database […]
Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter
Today’s cyber attackers are looking beyond network systems and devices to target organizations through digital platforms outside your perimeter. It’s time to detect, expose, and disrupt these external threats to […]
Publisher’s Spotlight: Cigent: Make Your Data Invisible
Cigent Technologies is a data security company that is renowned for their data protection capabilities. They’ve had a long-standing relationship with the U.S. government and have been a trusted resource […]
Red Cross Red Flags: The Human Repercussions of Cyberattacks
By Tim Wallen, UK and Ireland Regional Director, Logpoint Many expected the war in Ukraine to be fought on two fronts – on the ground and in the ether – […]
Why Now Is the Time to Prepare for The Quantum Threat
Quantum computers are set to bring about many changes to cybersecurity and beyond, but why should companies start preparations for the quantum threat today? By Ali El Kaafarani, CEO & […]
There’s No Place for Guesswork in Cyber-Attack Investigations
Accelerating Incident Response with Digital Forensics By Harsh Behl, Director of Product Management, Exterro Responding To Today’s Threat Landscape You can’t ignore the headlines. From the Irish health service to […]
4 Ways to Improve Azure Active Directory Security
Why identity has emerged as the security perimeter in hybrid deployments By Guido Grillenmeier, Chief Technologist at Semperis Cloud-led innovation has accelerated the digital transformation of many organizations that have […]
Half of Organizations Have Experienced a Cyber Attack on Their Critical IT Assets
By Diem Shin, Product Marketing Lead at Telos Corporation Today’s organizations are cloud-centric and are more connected than ever before. Many organizations are ladened with legacy systems and complex IT […]
Log4j Showed Us That Public Disclosure Still Helps Attackers.
Public disclosure is still a bit of a mess By Alex Haynes, CISO, CDL At 2:25 pm on the 9th of December an infamous (now deleted) tweet linking a 0-day […]
Cybersecurity, Especially in Critical Infrastructure and State Government, Is A Huge Issue Right Now
There is little doubt that continued effort at all levels across infrastructure and government is required to ensure the resilience required is in place By Ben Lane, Events Manager, Torch […]
Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service industry
Technological progress also enhances the danger of cyber threats By C. Max Farrell¸ senior technical marketing specialist & Chiyi Lin, product line manager TXOne Networks Until about ten years ago, […]
Too Hot to Handle:The case for Zero Trust and SASE
By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance on legacy systems and solutions. As cybercriminals have evolved their methods, the security adopted […]
How to Fix Mid-Market Security Using Intelligent Automation and AI
By Guy Moskowitz, CEO, Coro Market forces are working against medium-sized businesses, leaving companies that don’t have large, dedicated security teams and fat cyber security budgets exposed to cyber threats. […]
On The Frontline in The War Against Hackers
By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift toward remote work, crime is moving from physical space to cyberspace. Businesses are conducting […]
Biggest Cyber Trend in 2022
You Can’t Fix Stupid By Guy Rosefelt, CPO, Sangfor Technologies Stop me if you have heard this one: a customer is working late at night, has been a long day, […]
Phishing Techniques in Disguise: What to Look for And Why You Should
By Rotem Shemesh, Lead Product Marketing Manager, Security Solutions, at Datto Phishing is a familiar concept to cybersecurity professionals – and hackers. According to a recent study, phishing attacks are […]
Directed Analytics – The Future of Data Management
By Simon Rolph, CEO & Founder of Such Sweet Thunder The world as we know it has changed – it’s undisputed. Industries of all kinds face a wholly different landscape […]