Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Self-Hosted AI: Enabling Secure Innovation Across the Federal and Defense Sectors

Many government agencies operate under restrictions that limit their use of cloud technology for software development. This limits their ability to realize AI’s transformative potential because most cutting-edge AI solutions…

Posted in Featured | Tagged , , , | Comments Off on Self-Hosted AI: Enabling Secure Innovation Across the Federal and Defense Sectors

Endpoint Security in 2025

The Necessity of EDR for Organizational Protection Introduction As organizations navigate the complexities of modern cyber threats in 2025, endpoint security has emerged as a cornerstone of effective defense strategies….

Posted in Featured | Tagged , , , | Comments Off on Endpoint Security in 2025

Cybersecurity Spotlight: How Kiteworks is Redefining Zero Trust from the Data Out

When it comes to the ever-evolving realm of cybersecurity, threats have become more costly, aggressive, and increasingly likely to be infiltrated through trusted partners. Many organizations find it challenging to…

Posted in Spotlight | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Cybersecurity Spotlight: How Kiteworks is Redefining Zero Trust from the Data Out

The Art and Science of Being a CISO

Have you ever wondered why people are chosen to become Chief Information Security Officers? I started thinking about my peers and listening to their stories of how they obtained their…

Posted in Featured | Tagged , , , | Comments Off on The Art and Science of Being a CISO

Digital Payment Security: Trends and Realities of 2025

As we navigate 2025, the digital transformation continues to reshape industries, with the financial sector  at its forefront. Digital payments are no longer an emerging trend, but a fundamental part…

Posted in Featured | Tagged , , , , | Comments Off on Digital Payment Security: Trends and Realities of 2025

High Speed Smishing: The Psychology Behind Toll Road Scams

Ping! A sudden message appears: “Please pay for Toll Road usage on [insert random day here].” Instantly, you find yourself wondering, Where did I go that day? Did I forget…

Posted in Featured, Popular | Tagged , , , , , , , | Comments Off on High Speed Smishing: The Psychology Behind Toll Road Scams

The Future of Cybersecurity: Predictions for 2025 and Beyond

by Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure to meet with many of the market leaders and innovators…

Posted in Featured | Tagged , , , , , | Comments Off on The Future of Cybersecurity: Predictions for 2025 and Beyond

The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance

by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts.  The PANCCD™ model (People,…

Posted in Featured | Tagged , , , | Comments Off on The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance

Innovator Spotlight: Keepnet Labs

Keepnet specializes in addressing human factors of security through innovative security awareness training and phishing simulation tools. This article highlights the significant findings of their 2024 Vishing (Voice Phishing) Response…

Posted in Spotlight | Tagged , , , | Comments Off on Innovator Spotlight: Keepnet Labs

Innovator Spotlight: Concentric

Data security is more critical than ever as organizations manage vast amounts of sensitive information across cloud and on-premises environments. According to a 2023 report by Varonis, over 53% of…

Posted in Spotlight | Tagged , , , | Comments Off on Innovator Spotlight: Concentric

The Identity Security Mirage: Unveiling the Hidden Risks in Your Digital Infrastructure

In today’s rapidly evolving digital landscape, organizations are increasingly reliant on complex networks of identities to power their operations. From human users to non-human accounts, such as service accounts, APIs,…

Posted in Featured | Tagged , , , , , | Comments Off on The Identity Security Mirage: Unveiling the Hidden Risks in Your Digital Infrastructure

SEC Cybersecurity Disclosure Rules – Are CISOs Ready to Go Beyond the Tip of the Iceberg?

It’s been more than six months since the SEC’s updated Cybersecurity Disclosure rules came into force. These rules represent a sea change for CISOs; both in terms of the burden…

Posted in Featured | Tagged , , , , , | Comments Off on SEC Cybersecurity Disclosure Rules – Are CISOs Ready to Go Beyond the Tip of the Iceberg?

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X