Vegas, Vulnerabilities, and Voices: Black Hat and Squadcon 2025
The week of August 4th, I had the opportunity to attend two exciting conferences in the cybersecurity world: Black Hat USA 2025 and Squadcon which were held in Las Vegas….
Federal Agency Makes Steampunk Appearance at Black Hat 2025
by Gary Miliefsky, Publisher, Cyber Defense Magazine Every year, Black Hat showcases not just the latest innovations and products from the cybersecurity industry but also the presence of major government…
Black Hat USA 2025 – AI, Innovation, and the Power of the Cybersecurity Community
By Gary Miliefsky, Publisher of Cyber Defense Magazine Black Hat, the cybersecurity industry’s most established and in-depth security event series, has once again proven why it remains the go-to gathering…
Amid Cyberthreats, Telecom Companies Must Balance Security with Innovation
Proactive Strategies Telecom Companies Can Take to Safeguard Their Data and Operations Telecommunication companies continue to face significant cybersecurity issues as network consumption by businesses and individuals evolves. Growing uncertainty…
You May Be Well-Architected, But Are You Secure?
Lessons from 6 Major Shared Infrastructure Incidents Cloud and network architects often focus on building high-performance, scalable environments in accordance with the “well-architected” frameworks prescribed by their cloud service providers…
From Firewalls to Families: Why Cyber Resilience Begins at Home
Building cyber awareness in the household lays the foundation for stronger, safer workplaces Playing an innocent-looking mobile game, a 10-year-old girl received a message from a stranger posing as her…
Quantum-Resilient AI Security: Defending National Critical Infrastructure in a Post-Quantum Era
Why CISOs Must Urgently Prepare for the Collision of AI-driven Threats and Quantum Decryption Risks In the next five to seven years, the cybersecurity landscape is expected to undergo a…
Security Awareness Programs Are Failing – Here’s What Actually Works
Learn why security awareness alone fails to prevent human error and how technical controls, and strong security culture can reduce risk. Every year, statistics are published on the top root…
Self-Hosted AI: Enabling Secure Innovation Across the Federal and Defense Sectors
Many government agencies operate under restrictions that limit their use of cloud technology for software development. This limits their ability to realize AI’s transformative potential because most cutting-edge AI solutions…
Endpoint Security in 2025
The Necessity of EDR for Organizational Protection Introduction As organizations navigate the complexities of modern cyber threats in 2025, endpoint security has emerged as a cornerstone of effective defense strategies….
Cybersecurity Spotlight: How Kiteworks is Redefining Zero Trust from the Data Out
When it comes to the ever-evolving realm of cybersecurity, threats have become more costly, aggressive, and increasingly likely to be infiltrated through trusted partners. Many organizations find it challenging to…
The Art and Science of Being a CISO
Have you ever wondered why people are chosen to become Chief Information Security Officers? I started thinking about my peers and listening to their stories of how they obtained their…