Page 5 - Cyber Defense eMagazine September 2025
P. 5

Deepfakes and Disinformation: Protecting Truth in the Age of AI----------------------------------- 198
              By Omkar Bhalekar, Sr Network Engineer, Tesla

            Securing the Mission: Why External Cyber Defense is Essential for Government and
            Education ---------------------------------------------------------------------------------------------------------- 203
              By Amit Weigman, Office of the CTO, Check Point Software Technologies

            Erase, Don’t Just Delete: How Secure File Wiping Can Stop Insider Threats -------------------- 207

              By Neha Sawhney, Marketing Specialist, Stellar Information Technology Pvt. Ltd.
            From Shadows to Spotlight—Why Low-Priority Assets Now Define the Frontline of
            Cybercrime -------------------------------------------------------------------------------------------------------- 211

              By Pankit Desai, CEO of Sequretek
            Grappling with a Post-CVE World --------------------------------------------------------------------------- 216

              By Tod Beardsley, VP Security Research,  runZero

            Guardians of the Factory: Defending Cyber-Physical Systems in Smart Manufacturing ----- 219
              By Omkar Bhalekar, Sr Network Engineer, Tesla

            How Digital Twins Enhance Grid Security ----------------------------------------------------------------- 223
              By Zac Amos, Features Editor, ReHack

            Breaking Traditional Encryption Protocols: Quantum Computing and the Future of Secure
            Communications ------------------------------------------------------------------------------------------------ 227

              By Joe Guerra,M.Ed. CASP+,CCSP, FedITC,LLC
            IGA Is a Journey, not a Destination – Plan Accordingly ------------------------------------------------ 234

              By Niels Fenger, Advisory Practice Director, Omada

            The Perimeter Is Not Enough---------------------------------------------------------------------------------- 238
              By Parker Pearson, Chief Strategy Officer, Donoma Software

            Passwordless, but Not Riskless ----------------------------------------------------------------------------- 243
              By Sudhakar Tiwari, Principal Solutions Architect, Zurich

            Privileged Access in the Age of Ransomware--as--a--Service (RaaS) ----------------------------- 249
              By Sandeep Dommari, Principal Architect, Ping Identity

            Reachability and Exploitability ------------------------------------------------------------------------------- 253

              By Julia Lorenz, Solutions Manager at Xygeni








            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          5
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   1   2   3   4   5   6   7   8   9   10