Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Sheltering from the Cyberattack Storm

As we move towards the summer and the promise of sunnier weather, it’s worth noting that the cybersecurity industry has seen more rain than sunshine recently. A slew of high-profile…

Posted in Featured | Tagged , , , , | Comments Off on Sheltering from the Cyberattack Storm

Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management

The massive Snowflake breach disclosed recently, involving hundreds of millions of stolen customer records, is a stark wake-up call for organizations to proactively manage their SaaS security. No doubt the…

Posted in Featured | Tagged , , , , , | Comments Off on Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management

Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management

Single Sign-On (SSO) serves as the linchpin connecting corporate networks, facilitating seamless access to various web applications without the need for repeated login credentials. However, there are several untold challenges…

Posted in Featured | Tagged , , , | Comments Off on Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management

How the Newest Tech Changes Cybersecurity Needs in the Legal Industry

Responsibly Adopting Technology to Improve Law Firm Productivity Lawyers face incredible pressure in their jobs to perform accurately and quickly. Thankfully, technology has been introduced that now allows legal professionals…

Posted in Featured | Tagged , , | Comments Off on How the Newest Tech Changes Cybersecurity Needs in the Legal Industry

The First 10 Days of a vCISOs Journey with a New Client

“In a quaint village nestled between rolling hills and dense forests, a young apprentice named Eli was learning to throw pottery from a master potter. On the first day by…

Posted in Featured | Tagged , , , | Comments Off on The First 10 Days of a vCISOs Journey with a New Client

How to Hunt for Volt Typhoon Malware in Critical Infrastructure

🚨🔍 Don’t miss out on the Hunt for Volt Typhoon event! 🌐💻 Join us to explore cutting-edge cyber tactics, innovative defense strategies, and the latest in threat detection. Perfect for…

Posted in Featured | Tagged , , , , , , | Comments Off on How to Hunt for Volt Typhoon Malware in Critical Infrastructure

Strengthening Cyber Defense with Threat Intelligence Operations

By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to…

Posted in Featured | Tagged , , , | Comments Off on Strengthening Cyber Defense with Threat Intelligence Operations

What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform

By Tom Tovar, Co-creator and CEO of Appdome There’s a major battle brewing between platform vs. platformization companies in cybersecurity. On either side, cybersecurity heavyweights are racing to offer fully…

Posted in Featured | Tagged , , , | Comments Off on What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform

Celebrating our 12th Anniversary at RSA conference 2024

It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with us for over a decade. I remember before we went…

Posted in Featured | Tagged , , , , , | Comments Off on Celebrating our 12th Anniversary at RSA conference 2024

UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

In an alarming revelation, officials from the Minnesota-based UnitedHealth Group disclosed on Monday that the health insurance and services giant fell victim to a cyberattack, resulting in the breach of…

Posted in Featured | Tagged , , , , | Comments Off on UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

Nick Shevelyov, Senior Executive Reporter, Cyber Defense Magazine On February 7, 2024, the US Government Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory titled “PRC State-Sponsored Actors Compromise and…

Posted in Featured | Tagged , , , , , , | Comments Off on Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure

by Lena Allen Introduction In this era of unprecedented technological interconnectedness, the safeguarding of critical infrastructure against cyber threats has ascended to a pinnacle of national security importance for the…

Posted in Featured | Tagged , | Comments Off on Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure

CISO Life: the Good, the Bad, the Ugly

What type of things can go wrong with Senior Leadership, the Org, Legal, HR, etc. by Dan K. Anderson In today’s hectic Cyber world, the role of CISO continues to…

Posted in Featured | Tagged , , , , | Comments Off on CISO Life: the Good, the Bad, the Ugly

OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft

Securing Operational Technology ACCESS THE RECORDING Kick-start your OT security program, wherever you are in your journey. Gain industry-specific insights into OT cybersecurity challenges and equip yourself with practical strategies…

Posted in Featured | Tagged , , , | Comments Off on OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft

Halting Hackers on the Holidays 2023

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive…

Posted in Featured | Tagged , , , | Comments Off on Halting Hackers on the Holidays 2023

Spotlight: Whitepaper: Information security for the medical device industry

With a focus on the medical device industry, this paper provides software developers, hardware developers, and manufacturers with an understanding of the necessity and benefits of cybersecurity preparedness that can…

Posted in Featured | Tagged , , , , , | Comments Off on Spotlight: Whitepaper: Information security for the medical device industry

Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through unlimited in-depth investigation, and rapidly respond to incidents. Radiant Security…

Posted in Featured | Tagged , , , , | Comments Off on Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio

When it comes to cybersecurity, the landscape is full of single-solution providers, making it easy for unexpected cyberthreats to sneak through the cracks. Fortra is creating a stronger, simpler strategy…

Posted in Featured | Tagged , , , | Comments Off on Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio

Publisher’s Spotlight: IANS: Providing Expert Guidance to CISOs and their Teams

IANS Research has been working for the last two decades to create a way for InfoSec practitioners to collaborate in ways that are often difficult in other settings. The IANS…

Posted in Featured | Tagged , , , , , | Comments Off on Publisher’s Spotlight: IANS: Providing Expert Guidance to CISOs and their Teams

Publisher’s Spotlight: Black Hat USA 2023 Closes on Record-Breaking Event in Las Vegas

Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, today announced the successful completion of the in-person component of Black Hat USA 2023. The event…

Posted in Featured | Tagged , , | Comments Off on Publisher’s Spotlight: Black Hat USA 2023 Closes on Record-Breaking Event in Las Vegas

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...

X