Monthly Archives: September 2023
Simplifying your Approach to the Zero Trust Journey
By Chris Cullerot, Director of Technology and Innovation, iTech AG Earlier this year, the Cybersecurity and Infrastructure Security Agency released its Zero Trust Maturity Model 2.0 to help agencies develop […]
Overcoming Challenges in Cyber Defense Business Naming in The Age of AI
Actionable Naming Strategies for Founders By Darpan Munjal, CEO and Founder, Squadhelp.com Establishing a strong brand identity is key to success in the cyber defense space, and it’s becoming more […]
Why IT Governance and Mitigating Risk is a Critical Part of Cyber Defense
Organizations must recognize how every solution they implement works together and as part of their larger defense-in-depth strategy. By Vincent Tran, CISSP, Co-Founder and Chief Operating Officer, Liongard So much […]
Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot
Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through unlimited in-depth investigation, and rapidly respond to incidents. Radiant Security […]
Gartner’s Calling for a Human-Centric Approach to Cybersecurity – Here’s How to Implement It
By Roy Zur, CEO, ThriveDX Enterprise Gartner, earlier this year, published a report stating that the future of cybersecurity lies with the very people helping businesses to operate and gain […]
How Continuous Authentication Is Changing the Game for BYOD And Contracted Employees
By Jasson Casey, Chief Technology Officer, Beyond Identity Five years ago, utilizing your personal device for work was considered a trendy perk. Now, it’s become a standard practice for many […]
Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’ Digital Sanctuaries
by Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine Overwhelming would be an understatement while walking through the 2023 BlackHat USA’s business hall. They featured over 440 of the industry’s leading […]
How The Growing Adoption of Cloud Is Giving Rise to New Security Challenges
By Joseph Carson, Chief Security Scientist & Advisory CISO, Delinea The cloud has become a necessity for modern businesses. More and more organizations are seeing the value of the cloud […]
Six Tips to Ensure a Strong Patch Management Strategy
By Ashley Leonard, CEO and Founder, Syxsense The proliferation of software applications and updates across the market today has put pressure on enterprise security teams to implement strong patch management […]
Three Ways to Protect the Data Powering Summer Vacations
By Amit Shaked, CEO and Co-Founder, Laminar The travel industry is in the midst of rapid recovery following the COVID-19 pandemic. In 2022, there were over 747 million passengers who […]
Triple Tactics
How APIs are being Targeted with Trinity Attacks By Andy Mills, VP EMEA, Cequence Security Application Programming Interfaces (APIs) are growing twice as fast as traditional web traffic but their […]
Publishers Spotlight: Nisos: Your Managed Intelligence Partner
Nisos is the Managed Intelligence™ team you need to consider working with to solve your most complex security challenges. They deliver smarter defense and more effective responses against advanced cyber […]
Criminals are Bypassing Authentication with Stolen Session Cookies
By Trevor Hilligoss, Director of Security Research, SpyCloud The last 12 months revealed a concerning trend in credential exposure. According to SpyCloud’s 2023 Identity Exposure Report, nearly half of the 721.5 […]
Cyber Attacks on Municipalities
What attracts cyber criminals to municipalities and how they can be prevented. By Veronika (Nikki) Jack, Student Majoring in Information Technology-Cybersecurity, George Mason University Cyber-attacks on municipalities have been increasing […]
How to interpret the 2023 MITRE ATT&CK Evaluation results
Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is […]
Publishers Spotlight: Omdia Research Risk-based Vulnerability Management Findings
Omdia research finds risk-based vulnerability management set to encompass the vulnerability management market by 2027 The first comparative research into the evolution of the vulnerability management market authored by Omdia […]
Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs
CyTwist has launched its Preemptive Cyber Attack Management Platform (PCAM) to enable defenders to expose attacks early and accurately while creating efficiencies in the SOC. They are building a platform […]
How Ai Can Be Used as A Tool to Help Monitor for Cybercrimes and Keep Kids Safe From Cyberbullying And Scams
By Ron Kerbs, CEO of Kidas Machine learning (ML) and classifiers have been used as cybersecurity tools for years. Starting in the 1990s, machine learning techniques began detecting known attacks […]
Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection
Dataminr delivers the earliest warnings on high impact events, emerging risks, threats, and other critical information far in advance of other sources. Recognized as one of the world’s leading AI […]
Blockchain Technology: Strengthening Cybersecurity and Protecting Against Password Leaks and Data Breaches
By Thomas Carter, CEO, True I/O In today’s digital landscape, the frequency and severity of password leaks and data breaches have reached unprecedented levels. These incidents pose significant financial and […]
Adaptive DDoS Attacks Get More Sophisticated: How to Beat Attackers’ New Ground Game
By Gary Sockrider, Director, Security Solutions, NETSCOUT The rapid expansion of Internet of Things (IoT) devices, which now number in the billions, not to mention upgrades to network infrastructure and […]
Analyzing Four Diverse Attack Techniques Used by XeGroup
By Brett Raybould – EMEA Solutions Architect, Menlo Security XeGroup is a prime example of the untold damage that sophisticated threat groups using modern attack techniques can now inflict on […]
TikTok Ban: The Death Knell for Free Access to the Web?
By Sebastian Schaub, CEO, hide.me Chinese tech company TikTok is firmly in the headlights as authorities in the US continue to scrutinise the App due to worries over a possible […]
What to Consider When Choosing Cybersecurity Insurance Coverage
By Richard Clarke, Chief Insurance Officer, Colonial Surety Company Despite the fact that marquee corporate names like Meta, T-Mobile, and Morgan Stanley have shelled out hundreds of millions of dollars […]
Bridging the Widening Gap in Cybersecurity Talent: Addressing the Urgent Need for Skilled Professionals
By Travis Doe, Marketing Executive, Secure IT Consult Introduction In today’s digital age, where technology is deeply integrated into our personal and professional lives, the importance of cybersecurity cannot be […]
Publisher’s Spotlight: F5: Multi-Cloud Security and Application Delivery
F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations […]
A Passwordless Future
By Sam Rehman, SVP, Chief Information Security Officer, at EPAM Systems, Inc. Using passwords is like carrying a large set of keys everywhere you go. You can get through doors, […]
Boost Your Business Security: How Cyber Insurance Shields You from Cyber Threats
By Simon Pascoe, Director, FD Beck Insurance Brokers As the digital landscape evolves, cyber threats have become a significant concern for all businesses. Protecting your business from these risks is […]
Has MFA Had Its Day?
By Ori Arbel, CTO, CYREBRO Multi-factor authentication (MFA) has become the authentication standard for nearly all types of businesses – from banks to bicycle rentals and everything in between. Yet, […]
From AI-driven Defense to Dark Web Threat Intelligence
How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […]