How to Hunt for Volt Typhoon Malware in Critical Infrastructure

🚨🔍 Don’t miss out on the Hunt for Volt Typhoon event! 🌐💻 Join us to explore cutting-edge cyber tactics, innovative defense strategies, and the latest in threat detection. Perfect for […]

Posted in Cyber Security News, Featured | Tagged , , , , , , | Comments Off on How to Hunt for Volt Typhoon Malware in Critical Infrastructure

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to […]

Posted in Cyber Security News, Featured | Tagged , , , , , , , | Comments Off on Why Do Hackers Love Cryptocurrency?

Celebrating our 12th Anniversary at RSA conference 2024

It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with us for over a decade. I remember before we went […]

Posted in Cyber Security News, Featured | Tagged , , , , , | Comments Off on Celebrating our 12th Anniversary at RSA conference 2024

UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

In an alarming revelation, officials from the Minnesota-based UnitedHealth Group disclosed on Monday that the health insurance and services giant fell victim to a cyberattack, resulting in the breach of […]

Posted in Cyber Security News, Featured | Tagged , , , , | Comments Off on UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

Nick Shevelyov, Senior Executive Reporter, Cyber Defense Magazine On February 7, 2024, the US Government Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory titled “PRC State-Sponsored Actors Compromise and […]

Posted in Cyber Security News, Featured | Tagged , , , , , , | Comments Off on Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure

by Lena Allen Introduction In this era of unprecedented technological interconnectedness, the safeguarding of critical infrastructure against cyber threats has ascended to a pinnacle of national security importance for the […]

Posted in Cyber Security News, Featured | Tagged , | Comments Off on Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure

CISO Life: the Good, the Bad, the Ugly

What type of things can go wrong with Senior Leadership, the Org, Legal, HR, etc. by Dan K. Anderson In today’s hectic Cyber world, the role of CISO continues to […]

Posted in Cyber Security News, Featured | Tagged , , , , | Comments Off on CISO Life: the Good, the Bad, the Ugly

A 5-Minute Refresher to Cryptography

 (featuring Alice and Bob) by Rajvi Shroff It’s an age-old question. Alice wants to send a message to Bob. But how can Alice send it to Bob without Eve, the […]

Posted in Cyber Security News, Featured | Tagged , | Comments Off on A 5-Minute Refresher to Cryptography

Smart Traffic Signals Security in the Era of AI and Smart Cars

Analyzing the Trade-off Between Efficiency and Security in Smart Traffic Signal Technology Integration. by Samridhi Agarwal, Masters Student, CMU Once a simple concept with red, yellow, and green bulbs, traffic […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Smart Traffic Signals Security in the Era of AI and Smart Cars

OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft

Securing Operational Technology ACCESS THE RECORDING Kick-start your OT security program, wherever you are in your journey. Gain industry-specific insights into OT cybersecurity challenges and equip yourself with practical strategies […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft

SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK

Top cybersecurity leaders in the NightDragon Advisor Council provide perspective on 2023 trends and 2024 spending outlook As our digital age continues to expand and become ubiquitous across every piece […]

Posted in Cyber Security News, Featured | Tagged , , | Comments Off on SPECIAL REPORT: CYBER LEADERS ON 2023 TRENDS AND 2024 OUTLOOK

Halting Hackers on the Holidays 2023 Part II: The Apps You (Shouldn’t) Trust

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine Read Part I first:  Halting Hackers on the Holidays 2023 – Cyber Defense Magazine As we count the breaches and total […]

Posted in Cyber Security News | Tagged , , , , | Comments Off on Halting Hackers on the Holidays 2023 Part II: The Apps You (Shouldn’t) Trust

There Are Cyberheroes: THE VIGILANCE MANIFESTO

A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI In the vast expanse of the digital realm, where shadows […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on There Are Cyberheroes: THE VIGILANCE MANIFESTO

Publishers Spotlight: The Syndicate Group (TSG)

The Syndicate Group (TSG) is a leading venture firm focused on revenue growth and new customer acquisition. Leveraging an ecosystem of strategic investors including more than 450 leading channel partner […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Publishers Spotlight: The Syndicate Group (TSG)

Spotlight: Whitepaper: Information security for the medical device industry

With a focus on the medical device industry, this paper provides software developers, hardware developers, and manufacturers with an understanding of the necessity and benefits of cybersecurity preparedness that can […]

Posted in Cyber Security News, Featured | Tagged , , , , , | Comments Off on Spotlight: Whitepaper: Information security for the medical device industry

Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem

Each year, the cybersecurity industry anticipates a handful of landmark research that informs the market regarding benchmarking best practices, understanding emerging trends, and innovation breakthroughs. The annual AT&T Cybersecurity Insights(TM) […]

Posted in Cyber Security News, Featured | Tagged , , , , | Comments Off on Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem

Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through unlimited in-depth investigation, and rapidly respond to incidents. Radiant Security […]

Posted in Cyber Security News, Featured | Tagged , , , , | Comments Off on Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Publishers Spotlight: Nisos: Your Managed Intelligence Partner

Nisos is the Managed Intelligence™ team you need to consider working with to solve your most complex security challenges. They deliver smarter defense and more effective responses against advanced cyber […]

Posted in Cyber Security News, Featured | Tagged , , | Comments Off on Publishers Spotlight: Nisos: Your Managed Intelligence Partner

Publishers Spotlight: Omdia Research Risk-based Vulnerability Management Findings

Omdia research finds risk-based vulnerability management set to encompass the vulnerability management market by 2027 The first comparative research into the evolution of the vulnerability management market authored by Omdia […]

Posted in Cyber Security News, Featured | Tagged , , | Comments Off on Publishers Spotlight: Omdia Research Risk-based Vulnerability Management Findings

Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs

CyTwist has launched its Preemptive Cyber Attack Management Platform (PCAM) to enable defenders to expose attacks early and accurately while creating efficiencies in the SOC. They are building a platform […]

Posted in Cyber Security News, Featured | Tagged , , , , , | Comments Off on Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs

Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection

Dataminr delivers the earliest warnings on high impact events, emerging risks, threats, and other critical information far in advance of other sources. Recognized as one of the world’s leading AI […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection

Publisher’s Spotlight: F5: Multi-Cloud Security and Application Delivery

F5 is a multi-cloud application services and security company committed to bringing a better digital world to life.​​​​​​​ F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations […]

Posted in Cyber Security News, Featured | Comments Off on Publisher’s Spotlight: F5: Multi-Cloud Security and Application Delivery

Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio

When it comes to cybersecurity, the landscape is full of single-solution providers, making it easy for unexpected cyberthreats to sneak through the cracks. Fortra is creating a stronger, simpler strategy […]

Posted in Cyber Security News, Featured | Tagged , , , | Comments Off on Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio

Publisher’s Spotlight: IANS: Providing Expert Guidance to CISOs and their Teams

IANS Research has been working for the last two decades to create a way for InfoSec practitioners to collaborate in ways that are often difficult in other settings. The IANS […]

Posted in Cyber Security News, Featured | Tagged , , , , , | Comments Off on Publisher’s Spotlight: IANS: Providing Expert Guidance to CISOs and their Teams

Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance Program

RegScale is a Modern GRC platform, delivering a simplified, integrated and scalable solution to meet the speed and real-time demands of the digital enterprise. The current manual and document-based approach […]

Posted in Cyber Security News, Featured | Tagged , , , , | Comments Off on Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance Program

Publisher’s Spotlight: Security Journey: Secure Coding Training

Security Journey is a secure coding education provider that is focused on addressing the evolving landscape of cybersecurity threats with comprehensive and engaging training. As security awareness has become a […]

Posted in Cyber Security News, Featured | Tagged , , , , , | Comments Off on Publisher’s Spotlight: Security Journey: Secure Coding Training

Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model

Arctic Wolf is a global leader in security operations, enabling customers to manage their cyber risk in the face of modern cyberattacks. Our Arctic Wolf Security Operations Cloud ingests and […]

Posted in Cyber Security News, Featured | Tagged , , | Comments Off on Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model

Publisher’s Spotlight: Normalyze: Data Security for Everything You Build and Run in The Cloud

Normalyze is a pioneering provider of data-first cloud security solutions that help global enterprises secure their data wherever it is stored and prevent data breaches. The Normalyze platform uses patented, […]

Posted in Cyber Security News, Featured | Tagged , , , , | Comments Off on Publisher’s Spotlight: Normalyze: Data Security for Everything You Build and Run in The Cloud

Publisher’s Spotlight: Cycode: Secure Code to Cloud – Application Security Posture Management (ASPM) at Scale

Cycode’s modern approach to application security enables organizations to effectively secure their cloud-native applications with cost-efficient use of tooling and staff across the SDLC. The Cycode platform makes AppSec tools better […]

Posted in Cyber Security News, Featured | Tagged , | Comments Off on Publisher’s Spotlight: Cycode: Secure Code to Cloud – Application Security Posture Management (ASPM) at Scale

Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection

CrowdSec is a modern, collaborative cybersecurity company committed to proactively safeguarding digital assets. With a growing community of 65,000+ active installations contributing to a robust, constantly-updated global IP reputation database […]

Posted in Cyber Security News | Tagged , , | Comments Off on Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...

X