Top 10 Reasons Cyber Defense Firms Should Hire Veterans
Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring to the cybersecurity industry By Bryon Kroger, Founder of Rise8 Following the […]
Tips And Trends for OT Cybersecurity In 2022: More SOAR, Cyber Hygiene And Renewed Compliance
By Peter Lund, Vice President of Product Management at OT security company Industrial Defender As of February 2022, we’re already witnessing an increased focus on OT cybersecurity — and for […]
Why the Future of Threat Detection and Prevention is Unified Security and Risk Analytics
Why True AI/ML Capabilities are Essential for Next-Gen Risk Analytics By Sanjay Raja, VP of Product Marketing at Gurucul As cloud adoption continues to grow and remote work becomes the […]
Is XDR The Right Solution for Today’s Security Threats?
Defining XDR’s Role in the Security Stack By Steve Garrison, VP Marketing, Stellar Cyber XDR and Open XR are two of the latest buzzwords in the cybersecurity tools market, but […]
3 Cybersecurity Certainties for 2022
By Bill Moore, XONA As businesses transitioned to hybrid work models in 2021, critical integrations between IT and OT technologies introduced new vulnerabilities that threat actors exploited with shocking frequency […]
How to strengthen cyber resilience with Unified BCDR
By Joe Noonan, General Manager, Unitrends and Spanning Cybercrime and hybrid work environments prompted by the pandemic have significantly impacted the way organizations protect and store their data. Data is […]
Have We Learned from Our Past Mistakes to Prevent Future Cyberattacks?
By Marc Packler, President, CISO Advisory, Silent Quadrant Gartner’s article, “The Top Cybersecurity Predictions for 2021-2022,” contains a quote from philosopher George Santayana: “Those who cannot remember the past are […]
Don’t Become a Horrible Headline: Some Tips on Redesigning Your Threat Posture for The 2022 Threat Landscape
By Omar Zarabi, Founder and CEO, Port53 Technologies As in previous years, the DefCon of the cybersecurity industry is best illustrated by the headlines – each a cautionary tale. The […]
Endpoint Malware and Ransomware Volume Already Exceeded 2020 Totals by the End of Q3 2021
By Corey Nachreiner, CSO, WatchGuard Technologies The cybersecurity landscape of today is constantly evolving and threat actors are not far behind as they target users with increasingly sophisticated and complex […]
The Safest Ways for Bitcoin Trading
By Robert Wilson, Freelancer During the year 2021, we experienced history in the cryptocurrency niche with the 3rd Bitcoin halving event unfolding. There has been unprecedented hype after this news […]
The Fragility of a GPS Centric World and the Importance of eLORAN
By Dan Dickey, President, Continental Electronics Corporation Both the importance of GPS systems and their vulnerability to a cyber incident or attack are well understood. What is less understood is […]
Why Changing Classified Document Status Can Affect Risk Levels and How Proactive Cybersecurity Methods Can Help
By Sam Hutton, SVP, Glasswall As ransomware attacks, insider threats, data breaches and phishing attacks against government agencies continue to skyrocket, organisations are at constant risk. There are many recent […]
Data Security Must Be a Priority as Employees Quit in Record Numbers
By Tim Sadler, Co-founder and CEO, Tessian The massive labor upheaval that dominated headlines in 2021 shows no signs of slowing down. The latest U.S. jobs report showed that 4.5 […]
Cyber Insurance: What Executives Need to Know Before Obtaining Coverage
By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by […]
Understanding Identity Detection and Response
Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related information to identify that a malicious attack campaign such as ransomware might […]
Detect Ransomware Data Exfiltration Immediately
By Randy Reiter CEO of Don’t Be Breached Ransomeware Attacks Have Increased During the COVID-19 Pandemic An off-site workforce has resulted in new security concerns since hackers now have many […]
The Cybersecurity Trends You Need to Know About In 2022
By Jamie Wilson, MD & Founder, Cryptoloc Technology Group In 2021, no sector of the Australian economy was safe from cybercrime. From government agencies to family businesses, and every type […]
Combining True MDR & SOC for Robust Cybersecurity
By Jon Murchison, Founder, and CEO, Blackpoint Cyber Assessing the Current Threat Landscape The only constant in the cyberthreat landscape is that it is ever evolving. Amid a global pandemic, […]
Killware is the Next Big Cybersecurity Threat
By Brian Erickson, Vice President or Strategy and Solutions and retired U.S. Navy Captain, Vidoori Today’s battlefield has expanded to a digital landscape, and the impact affects the general population […]
Responding To the Ransomware Pandemic
By Tom McVey, Solution Architect, Menlo Security Last year, Kaseya became the victim of the largest ransomware attack in history when Russian-linked hacker group REvil breached the US software company’s […]
Why Ransomware is Only a Symptom of a Larger Problem
While ransomware is arguably the greatest current security threat to organizations, its rise has distracted us from the true issue at hand: extortion-based crimes. By Jeff Palatt, Vice President, Technical […]
Today’s Digital Battlefield Demands Resilience Beyond Infrastructure
By Mohammed Al Mohtadi, Cyber Information Security Officer, Injazat There is a battle underway globally that requires every business to identify their risks of attack, fortify their defences, and continually […]
Web Application Penetration Testing Checklist with OWASP Top 10
We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a […]
Mitigating Risk from Insider Threats in 2022
By Isaac Kohen, Teramind Back in August 2020, a story of an insider threat caught headlines when the employee turned down a $1M bribe to put ransomware on Tesla’s servers […]
Decision Trees in Case of a Ransomware Attack
Does Your Organization Have a Procedure to Handle a Ransomware? Is It Worth Paying the Attackers? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. The number of ransomware attacks […]
How To Improve Federal Endpoint Detection and Response Tactics and Gain Network Visibility
By Matt Marsden, Vice President, Technical Account Management, Federal, Tanium Endpoint detection and response (EDR) was put on center-stage when the Office of Management and Budget (OMB) released a memo requiring that agencies must collaborate […]
Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure
By Tomasz Kowalski, CEO, Secfense According to a Trustwave report, medical data may cost up to $250 per record on the black market, while stolen payment card data is sold […]
How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks
By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder why an article on identity theft appears in Cyber Defense Magazine, and […]
Our Cyber Defenses Need to Be Battle-Tested to Withstand Future Threats
By Hugo Sanchez, Founder and CEO of rThreat Just a few weeks ago, the FBI released a statement confirming that their server was hacked over the weekend, resulting in thousands […]
Cybersecurity Experts Share Their Predictions for 2022
By Danny Lopez, CEO of Glasswall The year 2021 raised many major cybersecurity concerns including the rise in ransomware attacks, phishing scams, and data breaches. Many organizations have embraced a […]