Self-Hosted AI: Enabling Secure Innovation Across the Federal and Defense Sectors
Many government agencies operate under restrictions that limit their use of cloud technology for software development. This limits their ability to realize AI’s transformative potential because most cutting-edge AI solutions…
Endpoint Security in 2025
The Necessity of EDR for Organizational Protection Introduction As organizations navigate the complexities of modern cyber threats in 2025, endpoint security has emerged as a cornerstone of effective defense strategies….
Cybersecurity Spotlight: How Kiteworks is Redefining Zero Trust from the Data Out
When it comes to the ever-evolving realm of cybersecurity, threats have become more costly, aggressive, and increasingly likely to be infiltrated through trusted partners. Many organizations find it challenging to…
The Art and Science of Being a CISO
Have you ever wondered why people are chosen to become Chief Information Security Officers? I started thinking about my peers and listening to their stories of how they obtained their…
Digital Payment Security: Trends and Realities of 2025
As we navigate 2025, the digital transformation continues to reshape industries, with the financial sector at its forefront. Digital payments are no longer an emerging trend, but a fundamental part…
High Speed Smishing: The Psychology Behind Toll Road Scams
Ping! A sudden message appears: “Please pay for Toll Road usage on [insert random day here].” Instantly, you find yourself wondering, Where did I go that day? Did I forget…
The Future of Cybersecurity: Predictions for 2025 and Beyond
by Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure to meet with many of the market leaders and innovators…
The PANCCD™ Model: Strengthening Cyber Resiliency and Compliance
by Gary S. Miliefsky, CISSP, fmDHS I came up with this model to simplify cybersecurity, resiliency and regulatory compliance for executives who are not cybersecurity experts. The PANCCD™ model (People,…
Innovator Spotlight: Keepnet Labs
Keepnet specializes in addressing human factors of security through innovative security awareness training and phishing simulation tools. This article highlights the significant findings of their 2024 Vishing (Voice Phishing) Response…
Innovator Spotlight: Concentric
Data security is more critical than ever as organizations manage vast amounts of sensitive information across cloud and on-premises environments. According to a 2023 report by Varonis, over 53% of…
The Identity Security Mirage: Unveiling the Hidden Risks in Your Digital Infrastructure
In today’s rapidly evolving digital landscape, organizations are increasingly reliant on complex networks of identities to power their operations. From human users to non-human accounts, such as service accounts, APIs,…
SEC Cybersecurity Disclosure Rules – Are CISOs Ready to Go Beyond the Tip of the Iceberg?
It’s been more than six months since the SEC’s updated Cybersecurity Disclosure rules came into force. These rules represent a sea change for CISOs; both in terms of the burden…