Page 3 - Cyber Defense eMagazine for September 2020
P. 3

Securing the Weakest Links in Today’s Public Cloud Environments -------------------------------------------- 65
              By Avi Shua, CEO, Orca Security

            Compliance in A Connected World -------------------------------------------------------------------------------------- 70

              By Kirsty Fisher, CFO, Titania

            Defending Ever Expanding Networks and IT Systems -------------------------------------------------------------- 74
              By Trevor Pott, Product Marketing Director, Juniper Networks

            The “New Normal” – Navigating Remote Work and Security in the COVID-19 Era ------------------------ 78

              By Bill Delisi, CEO of GOFBA

            Do Not Forget to Securely Lock Your Data in Microsoft Teams ------------------------------------------------- 81
              By Johanna Reisacher, Marketing Manager, Secomba GmbH

            Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy ----------- 88

              By Joanne Godfrey, Security Evangelist, ZeroNorth

            How to Close the Door on Ripple20 Vulnerabilities by Combining Local Security with Software Defined
            Perimeters -------------------------------------------------------------------------------------------------------------------- 92

              By Don Boxley, Co-founder and CEO, DH2i [https://dh2i.com]
            Funding Schemes and Cyber Security ---------------------------------------------------------------------------------- 95

              By Milica D. Djekic

            Media Content Captured on Mobile Is Driving Compliance Problems ----------------------------------------- 97

              By Josh Bohls, CEO, Inkscreen
            Weaknesses of Biometric Authentication --------------------------------------------------------------------------- 100

              By Mark Perkins, MS, CISSP, IT Manager

















            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         3
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   1   2   3   4   5   6   7   8