Monthly Archives: September 2023

Simplifying your Approach to the Zero Trust Journey

By Chris Cullerot, Director of Technology and Innovation, iTech AG Earlier this year, the Cybersecurity and Infrastructure Security Agency released its Zero Trust Maturity Model 2.0 to help agencies develop […]

Posted in Cyber Security News | Comments Off on Simplifying your Approach to the Zero Trust Journey

Overcoming Challenges in Cyber Defense Business Naming in The Age of AI

Actionable Naming Strategies for Founders By Darpan Munjal, CEO and Founder, Squadhelp.com Establishing a strong brand identity is key to success in the cyber defense space, and it’s becoming more […]

Posted in Cyber Security News | Comments Off on Overcoming Challenges in Cyber Defense Business Naming in The Age of AI

Why IT Governance and Mitigating Risk is a Critical Part of Cyber Defense

Organizations must recognize how every solution they implement works together and as part of their larger defense-in-depth strategy. By Vincent Tran, CISSP, Co-Founder and Chief Operating Officer, Liongard So much […]

Posted in Cyber Security News | Comments Off on Why IT Governance and Mitigating Risk is a Critical Part of Cyber Defense

Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through unlimited in-depth investigation, and rapidly respond to incidents. Radiant Security […]

Posted in Cyber Security News, Featured | Tagged , , , , | Comments Off on Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Gartner’s Calling for a Human-Centric Approach to Cybersecurity – Here’s How to Implement It

By Roy Zur, CEO, ThriveDX Enterprise Gartner, earlier this year, published a report stating that the future of cybersecurity lies with the very people helping businesses to operate and gain […]

Posted in Cyber Security News | Comments Off on Gartner’s Calling for a Human-Centric Approach to Cybersecurity – Here’s How to Implement It

How Continuous Authentication Is Changing the Game for BYOD And Contracted Employees

By Jasson Casey, Chief Technology Officer, Beyond Identity Five years ago, utilizing your personal device for work was considered a trendy perk. Now, it’s become a standard practice for many […]

Posted in Cyber Security News | Comments Off on How Continuous Authentication Is Changing the Game for BYOD And Contracted Employees

Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’ Digital Sanctuaries

by Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine Overwhelming would be an understatement while walking through the 2023 BlackHat USA’s business hall. They featured over 440 of the industry’s leading […]

Posted in Cyber Security News | Comments Off on Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’ Digital Sanctuaries

How The Growing Adoption of Cloud Is Giving Rise to New Security Challenges

By Joseph Carson, Chief Security Scientist & Advisory CISO, Delinea The cloud has become a necessity for modern businesses. More and more organizations are seeing the value of the cloud […]

Posted in Cyber Security News | Comments Off on How The Growing Adoption of Cloud Is Giving Rise to New Security Challenges

Six Tips to Ensure a Strong Patch Management Strategy

By Ashley Leonard, CEO and Founder, Syxsense The proliferation of software applications and updates across the market today has put pressure on enterprise security teams to implement strong patch management […]

Posted in Cyber Security News | Comments Off on Six Tips to Ensure a Strong Patch Management Strategy

Three Ways to Protect the Data Powering Summer Vacations

By Amit Shaked, CEO and Co-Founder, Laminar The travel industry is in the midst of rapid recovery following the COVID-19 pandemic. In 2022, there were over 747 million passengers who […]

Posted in Cyber Security News | Comments Off on Three Ways to Protect the Data Powering Summer Vacations

Triple Tactics

How APIs are being Targeted with Trinity Attacks By Andy Mills, VP EMEA, Cequence Security Application Programming Interfaces (APIs) are growing twice as fast as traditional web traffic but their […]

Posted in Cyber Security News | Comments Off on Triple Tactics

Publishers Spotlight: Nisos: Your Managed Intelligence Partner

Nisos is the Managed Intelligence™ team you need to consider working with to solve your most complex security challenges. They deliver smarter defense and more effective responses against advanced cyber […]

Posted in Cyber Security News, Featured | Tagged , , | Comments Off on Publishers Spotlight: Nisos: Your Managed Intelligence Partner

Criminals are Bypassing Authentication with Stolen Session Cookies

By Trevor Hilligoss, Director of Security Research, SpyCloud The last 12 months revealed a concerning trend in credential exposure. According to SpyCloud’s 2023 Identity Exposure Report, nearly half of the 721.5 […]

Posted in Cyber Security News | Comments Off on Criminals are Bypassing Authentication with Stolen Session Cookies

Cyber Attacks on Municipalities

What attracts cyber criminals to municipalities and how they can be prevented. By Veronika (Nikki) Jack, Student Majoring in Information Technology-Cybersecurity, George Mason University Cyber-attacks on municipalities have been increasing […]

Posted in Cyber Security News | Comments Off on Cyber Attacks on Municipalities

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is […]

Posted in Cyber Security News, Featured | Comments Off on How to interpret the 2023 MITRE ATT&CK Evaluation results

Publishers Spotlight: Omdia Research Risk-based Vulnerability Management Findings

Omdia research finds risk-based vulnerability management set to encompass the vulnerability management market by 2027 The first comparative research into the evolution of the vulnerability management market authored by Omdia […]

Posted in Cyber Security News, Featured | Tagged , , | Comments Off on Publishers Spotlight: Omdia Research Risk-based Vulnerability Management Findings

Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs

CyTwist has launched its Preemptive Cyber Attack Management Platform (PCAM) to enable defenders to expose attacks early and accurately while creating efficiencies in the SOC. They are building a platform […]

Posted in Cyber Security News, Featured | Tagged , , , , , | Comments Off on Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs

How Ai Can Be Used as A Tool to Help Monitor for Cybercrimes and Keep Kids Safe From Cyberbullying And Scams

By Ron Kerbs, CEO of Kidas Machine learning (ML) and classifiers have been used as cybersecurity tools for years. Starting in the 1990s, machine learning techniques began detecting known attacks […]

Posted in Cyber Security News | Comments Off on How Ai Can Be Used as A Tool to Help Monitor for Cybercrimes and Keep Kids Safe From Cyberbullying And Scams

Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection

Dataminr delivers the earliest warnings on high impact events, emerging risks, threats, and other critical information far in advance of other sources. Recognized as one of the world’s leading AI […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection

Blockchain Technology: Strengthening Cybersecurity and Protecting Against Password Leaks and Data Breaches

By Thomas Carter, CEO, True I/O In today’s digital landscape, the frequency and severity of password leaks and data breaches have reached unprecedented levels. These incidents pose significant financial and […]

Posted in Cyber Security News | Comments Off on Blockchain Technology: Strengthening Cybersecurity and Protecting Against Password Leaks and Data Breaches

Adaptive DDoS Attacks Get More Sophisticated: How to Beat Attackers’ New Ground Game 

By Gary Sockrider, Director, Security Solutions, NETSCOUT The rapid expansion of Internet of Things (IoT) devices, which now number in the billions, not to mention upgrades to network infrastructure and […]

Posted in Cyber Security News | Comments Off on Adaptive DDoS Attacks Get More Sophisticated: How to Beat Attackers’ New Ground Game 

Analyzing Four Diverse Attack Techniques Used by XeGroup

By Brett Raybould – EMEA Solutions Architect, Menlo Security XeGroup is a prime example of the untold damage that sophisticated threat groups using modern attack techniques can now inflict on […]

Posted in Cyber Security News | Comments Off on Analyzing Four Diverse Attack Techniques Used by XeGroup

TikTok Ban: The Death Knell for Free Access to the Web?

By Sebastian Schaub, CEO, hide.me Chinese tech company TikTok is firmly in the headlights as authorities in the US continue to scrutinise the App due to worries over a possible […]

Posted in Cyber Security News | Comments Off on TikTok Ban: The Death Knell for Free Access to the Web?

What to Consider When Choosing Cybersecurity Insurance Coverage

By Richard Clarke, Chief Insurance Officer, Colonial Surety Company Despite the fact that marquee corporate names like Meta, T-Mobile, and Morgan Stanley have shelled out hundreds of millions of dollars […]

Posted in Cyber Security News | Comments Off on What to Consider When Choosing Cybersecurity Insurance Coverage

Bridging the Widening Gap in Cybersecurity Talent: Addressing the Urgent Need for Skilled Professionals

By Travis Doe, Marketing Executive, Secure IT Consult Introduction In today’s digital age, where technology is deeply integrated into our personal and professional lives, the importance of cybersecurity cannot be […]

Posted in Cyber Security News | Comments Off on Bridging the Widening Gap in Cybersecurity Talent: Addressing the Urgent Need for Skilled Professionals

Publisher’s Spotlight: F5: Multi-Cloud Security and Application Delivery

F5 is a multi-cloud application services and security company committed to bringing a better digital world to life.​​​​​​​ F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations […]

Posted in Cyber Security News, Featured | Comments Off on Publisher’s Spotlight: F5: Multi-Cloud Security and Application Delivery

A Passwordless Future

By Sam Rehman, SVP, Chief Information Security Officer, at EPAM Systems, Inc. Using passwords is like carrying a large set of keys everywhere you go. You can get through doors, […]

Posted in Cyber Security News | Comments Off on A Passwordless Future

Boost Your Business Security: How Cyber Insurance Shields You from Cyber Threats

By Simon Pascoe, Director, FD Beck Insurance Brokers As the digital landscape evolves, cyber threats have become a significant concern for all businesses. Protecting your business from these risks is […]

Posted in Cyber Security News | Comments Off on Boost Your Business Security: How Cyber Insurance Shields You from Cyber Threats

Has MFA Had Its Day?

By Ori Arbel, CTO, CYREBRO Multi-factor authentication (MFA) has become the authentication standard for nearly all types of businesses – from banks to bicycle rentals and everything in between. Yet, […]

Posted in Cyber Security News | Comments Off on Has MFA Had Its Day?

From AI-driven Defense to Dark Web Threat Intelligence

How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity is constantly evolving, with new threats emerging every day and […]

Posted in Cyber Security News | Comments Off on From AI-driven Defense to Dark Web Threat Intelligence

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X