Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program
An Interview With Jeffrey Stephens
🔒 Dive into the electrifying world of cyber espionage and the ghost chip with Jeffrey S. Stephens on @CyberDefenseTV! 💻 Unravel the gripping tale of Nick Reagan’s pursuit of “Enemies […]
Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game
If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure across all sectors, and “be resilient” to the constant onslaught […]
Keeping SaaS Data Under Wraps
By Hananel Livneh, Head of Product Marketing at Adaptive Shield A Case Study on How a $10B Global Media Firm Significantly Improved SaaS Security Posture Media firms in the business […]
Your #1 Security Initiative in 2024 Should be Operational Resilience
By David Ratner, CEO of HYAS The cyber world is filled with lots of scary threats and new buzzwords, none of them bigger than AI. As boards, CEOs, and security […]
IP network security in the age of DDoS and quantum computing
By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to address the global broadband divide, continued digital transformation with the […]
Institutionalizing Awareness to Stop Cyberattacks
By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology or tool that will stop cyberattacks, but after years in […]
6 Steps to Accelerate Cybersecurity Incident Response
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must […]
Seeing Through the Vendor Spin: Interpreting the MITRE ATT&CK Evaluation Results
The 2023 MITRE ATT&CK Enterprise Evaluation results were just released and that means one thing – all participating vendors are scrambling to show themselves in the best light possible. This, […]
Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’ Digital Sanctuaries
by Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine Overwhelming would be an understatement while walking through the 2023 BlackHat USA’s business hall. They featured over 440 of the industry’s leading […]
How to interpret the 2023 MITRE ATT&CK Evaluation results
Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is […]
An Interview with Dasha Deckwerth – Stealth ISS Group
Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure
Mastering Patch Management: 10 Essential Best Practices for Optimal Security
What is patch management and why is it important? Software development is a continuous process, whether it involves creating a Windows Server or a simple text editor. Vendors release functional […]
ImmuniWeb AI Platform
Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […]
Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change
by Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing its intended job, giving a false sense of security, and causing […]
Top 100 Women in Cybersecurity
Abbott Ekta Sirwani https://www.linkedin.com/in/ekta-sirwani/ Absolute Christy Wyatt https://www.linkedin.com/in/christywyatt/ Alert Logic Sydna Kelley https://www.linkedin.com/in/sydnakelley/ Alta Associates Joyce Brocaglia https://www.linkedin.com/in/joycebrocaglia/ AppEsteem Corporation Hong Jai https://www.linkedin.com/in/hong-jia-02234654/ Assurant Marilyn Piccolo https://www.linkedin.com/in/marilyn-piccolo-777a728/ Attivo Networks Sarah […]
Top 100 CISOs
These CISOs competed against thousands of candidates for this prestigious award. Judges look at these candidates, searching for the most innovative, with unparalleled success in communicating with their boards […]
Top 100 Cybersecurity Startups
10dot https://10dot.com/ Acronis https://www.acronis.com/ Alertot https://www.alertot.com/ Aqua https://www.aquasec.com/ Argus Security https://www.argussecurity.it/ Augmenta Cyber Security https://augcyba.com/ Auth0 https://auth0.com/ Authomize https://www.authomize.com/ Axis Security https://www.axissecurity.com/ Axonius https://www.axonius.com/ Axur https://axur.com/ Balbix https://www.balbix.com/ Black […]
Moola Market Manipulation
Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a non-custodial liquidity protocol operating on the Celo blockchain – suffered […]
Managing Cybersecurity for Critical National Infrastructure
General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant, Artech, LLC What’s the reality of managing a cybersecurity program […]
Remote Workers Face Growing Threats from Phishing Attacks
Analysis Shows Phishing Strikes Up 61% Over 2021, With a 50% Increase on Mobile Devices By Patrick Harr, CEO, SlashNext Hybrid offices and BYOD policies have reorganized the workplace forever, […]
Infrastructure-as-Code Security: a Critical Responsibility
By Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries. Although its principles have been established for over half a […]
Mobile App APIs Are Crucial to Businesses – But Are Under-Protected
The State of Mobile Security in 2022” Underscores Both the Importance of Mobile Apps and the Relative Lack of Resources Being Allocated to Runtime App and Data Protection. By David […]
How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce
By Raul Popa, CEO & Co-Founder, TypingDNA Like other types of insurance, Cybersecurity Insurance protects businesses in case of a rainy day. But as breaches become commonplace, insurers are running […]
How Does a Botnet Attack Work?
By Zac Amos, Features Editor, ReHack Keeping up with cybercriminals is a full-time job, as new attack types appear daily. Cybersecurity analysts must consider botnet attacks among classic ransomware and […]
How 5G Networks Are Secured and Enabled By SASE
By Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and environments, there are important deployment and security considerations. While still […]
The Rise in Cyber-Attacks from Bad International Actors
There has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems from organizations approaching encryption wrong. By Scott Bledsoe, CEO, Theon Technology […]
Five Ways to Keep Endpoint Protection Simple
By Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve. In fact, research shows that 68% of organizations have experienced […]
Doenerium: When Stealing from Thieves Is Also a Crime
By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat experts uncovered a particularly worrying and sophisticated phishing attack that […]