Monthly Archives: July 2023
7 Benefits of Implementing ZTNA
(Zero Trust Network Access) By Howie Robleza, Freelance Writer, Avigilon One of the most significant worries for business leaders in the current climate is the potential for an internal security […]
The Power of AI In Today’s Rapidly Evolving Financial Crime Landscape
By Pedro Barata, Chief Product Officer, Feedzai Fraud has plagued the financial services sector for years. In today’s rapidly evolving digital landscape, financial institutions are under increasing pressure to safeguard […]
Why Inadequate Investment in Cybersecurity is a False Economy
By Luke Dash, CEO, ISMS.online Already suffering the most cyberattacks than any other European country [RH1], the UK looks set to experience a proliferation of vulnerabilities as businesses struggle to […]
A Look into The Future: My Journey at the 2023 RSA Conference and The Exciting, Yet Troubling Path of Cybersecurity Innovation
Exploring the Future of Cybersecurity at the 2023 RSA Conference By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine As the recipient of Cyber Defense Magazine’s 2023 Young Women in […]
Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023
By Sanjay Raja, VP of Product, Gurucul Dwell time, or the length of time a cyber attacker remains hidden within an organization’s environment, is a major threat plaguing Security Operations […]
What Can We Learn by Analyzing 197 Years of Cumulative Cybersecurity Testing?
By Carolyn Crandall, Chief Security Advocate, Cymulate Each year, Cymulate releases a Cybersecurity Effectiveness Report that summarizes and analyzes the findings from customers’ security assessments throughout the year. Unlike other […]
The Next Evolution of Devsecops For The Defense Department
By Jonas Lazo, Vice President of Digital Engineering, Sev1Tech The White House recently proposed an $842 billion budget for the Department of Defense (DOD) for 2024, emphasizing the Administration’s commitment […]
The Brick Wall of Identity Security: Five Parts for A Rock-Solid Defense
By Raj Gopalakrishna, Co-Founder and Chief Product Architect, Acalvio Technologies The use of stolen credentials and resulting identity compromises have become a top attack trajectory. In the past year, 84% […]
An Interview with Sarah Armstrong-Smith
By Megan Lupton, Senior Content Executive, Champions Speakers Sarah Armstrong-Smith is a globally revered voice in the cyberspace. She is regularly booked for corporate conference and as a Cyber Security […]
Why Should Everyone in Your Workplace Know About Cybersecurity?
The Importance Of Strengthening Your Organization’s Human Firewall By Involving All Business Levels And Functional Areas. By Sara Velásquez, Growth Lead, Seccuri What exactly is cybersecurity? Is it a matter […]
Three Things Corporate Board Members Need to Know to Protect Their Companies From Cyberattacks
By Sami Mäkiniemelä, Chief Security Officer, Miradore Last year, the U.S. saw a 57% increase in the number of cyberattacks — that’s nearly double the 38% increase that was reported […]
Securing Communications for Operational Military Success
By Nicole Allen, Senior Marketing Executive at Salt Communications. The significance in having Secure Communications for Military Operations. Thanks to expertly planned operational communications, military duties can be carried out […]
Phishing Kit: New Frontier of Hacker Attacks within Everyone’s Reach
By Lorenzo Asuni, CMO, Ermes Cyber Security The Phishing phenomenon is growing exponentially, and unlike the most common forms of scam, it is much more dangerous, because it is more […]
Operationalizing Zero Trust Architecture
By Chaim Mazal, Chief Security Officer, Gigamon Over the last few years, organizations have been hearing about a Zero Trust architecture (ZTA) as a means for IT leaders to take a […]
Oh, Great and Powerful Cloud, I Wish to Be Free Of The Burdens Of Infrastructure!
By Craig Burland, CISO, Inversion6 The Cloud’s booming voice, stunning light show and smoke fill the room. “Faster! More agile! Cheaper! Business aligned! Strategic! I have the answer to all […]
How Professional Human Hackers Choose Their Targets
By Peter Warmka, Founder, Counterintelligence Institute Over the past few years, Cybersecurity professionals have acknowledged the increasing need of security awareness training to combat the growing threat from social engineering. […]
How Should CMMC Impact Your Remote Work Policies?
By Zac Amos, Features Editor, ReHack Cybersecurity Maturity Model Certification (CMMC) is another compliance framework defense industrial base (DIB) contractors can add to their toolkits to work for the Department […]
Hacks And Data Leaks
How to protect businesses from cyberattacks By Sergey Ozhegov, CEO, SearchInform Hacks and data leaks: how to protect businesses from cyberattacks Hardly a week goes by without a hack or […]
How Sandboxes Protect Organizations from Malware — Known And Unknown
From Detecting Threats to Collecting Rich Signature Data — Sandboxes Help Malware Researchers Keep Defense Systems In Sync With An Evolving Threat Landscape. By Jack Zalesskiy, Technology Writer, ANY.RUN Over […]
What are NIST Encryption Standards? Why Do They Matter a Lot?
By Amar Basic, Co-Founder CyberArrow Data encryption is essential in today’s technologically advanced world to safeguard sensitive information against hacker assaults and data breaches, as an estimated 30,000 websites are […]
An Interview with Greg Van Der Gaast
By Megan Lupton, Senior Content Executive, Champions Speakers From one of the most wanted hackers to being featured in the Top Trending Ethical Hackers list, Greg van der Gaast has […]
Most Commonly Overlooked Attack Surface Vulnerabilities & How to Fix Them
By Marc Laliberte, Director of Security Operations at WatchGuard Over the last decade, many organizations have rapidly accelerated their digital transformation. The rise in cloud hosted Software-as-a-Service (SaaS) applications, continued […]
Empowered Encryption
Why organizations must take back control of their data By Dimitri Nemirovsky, Co-Founder & COO, Atakama Sometimes, what a change represents is more meaningful than the change itself. Case in […]
Online Privacy Statistics
By Milos Djordjevic, Online Privacy Expert, VPN Central Online privacy is a burning issue in our modern threat landscape. It concerns both companies and individuals — no one can afford […]
Investing Wisely
Where to focus spend during the economic downturn By Tim Wallen, Regional Director, UK, US & Emerging Markets, Logpoint There remains a great deal of uncertainty when it comes to […]
From AI-driven Defense to Dark Web Threat Intelligence
How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […]
Before You Deploy Advanced Tech, Consider the Hidden Cyberthreats
By Jennifer Varner, Director Security Solutions Sales – North America, Verizon Business Every year, emerging technologies come to market, offering new opportunities to connect with employees and customers in previously […]
Healthcare Under Siege
The Critical Threat of Cloud and IoMT Vulnerabilities By Ty Greenhalgh, Industry Principal, Healthcare, Claroty The healthcare sector is grappling with a perfect storm of challenges: economic uncertainty, staff shortages, […]
Data Privacy and Data Protection: What Enterprises Need to Know
By Anurag Lal, President and CEO of NetSfere Digital transformation is exponentially increasing the amount of data companies collect, use and store. In fact, it is projected that the total […]
Protecting Sensitive Information Within Translation
Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO, Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as financial […]