Page 5 - Cyber Defense eMagazine September 2025
P. 5
Deepfakes and Disinformation: Protecting Truth in the Age of AI----------------------------------- 198
By Omkar Bhalekar, Sr Network Engineer, Tesla
Securing the Mission: Why External Cyber Defense is Essential for Government and
Education ---------------------------------------------------------------------------------------------------------- 203
By Amit Weigman, Office of the CTO, Check Point Software Technologies
Erase, Don’t Just Delete: How Secure File Wiping Can Stop Insider Threats -------------------- 207
By Neha Sawhney, Marketing Specialist, Stellar Information Technology Pvt. Ltd.
From Shadows to Spotlight—Why Low-Priority Assets Now Define the Frontline of
Cybercrime -------------------------------------------------------------------------------------------------------- 211
By Pankit Desai, CEO of Sequretek
Grappling with a Post-CVE World --------------------------------------------------------------------------- 216
By Tod Beardsley, VP Security Research, runZero
Guardians of the Factory: Defending Cyber-Physical Systems in Smart Manufacturing ----- 219
By Omkar Bhalekar, Sr Network Engineer, Tesla
How Digital Twins Enhance Grid Security ----------------------------------------------------------------- 223
By Zac Amos, Features Editor, ReHack
Breaking Traditional Encryption Protocols: Quantum Computing and the Future of Secure
Communications ------------------------------------------------------------------------------------------------ 227
By Joe Guerra,M.Ed. CASP+,CCSP, FedITC,LLC
IGA Is a Journey, not a Destination – Plan Accordingly ------------------------------------------------ 234
By Niels Fenger, Advisory Practice Director, Omada
The Perimeter Is Not Enough---------------------------------------------------------------------------------- 238
By Parker Pearson, Chief Strategy Officer, Donoma Software
Passwordless, but Not Riskless ----------------------------------------------------------------------------- 243
By Sudhakar Tiwari, Principal Solutions Architect, Zurich
Privileged Access in the Age of Ransomware--as--a--Service (RaaS) ----------------------------- 249
By Sandeep Dommari, Principal Architect, Ping Identity
Reachability and Exploitability ------------------------------------------------------------------------------- 253
By Julia Lorenz, Solutions Manager at Xygeni
Cyber Defense eMagazine – September 2025 Edition 5
Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.