Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Defense in Diversity: A Strategy for Robust Cybersecurity

The concept of “defense in depth” dates back to ancient times, epitomized by the ramparts, draw-bridge, towers, and battlements surrounding a medieval castle.  Cybersecurity’s adaptation of the idea — multiple…

Posted in Uncategorized | Tagged , , , | Comments Off on Defense in Diversity: A Strategy for Robust Cybersecurity

Lead with simplicity: A guide for strengthening security in logistics

Supply chains are the pulse of our global economy. When they falter, the effects can ripple through industries — impacting production lines, delivery schedules, company performance, and, ultimately, customer satisfaction….

Posted in Featured | Tagged , , , | Comments Off on Lead with simplicity: A guide for strengthening security in logistics

Shedding Light on The Dark Web: Enhancing Cybersecurity Through Proactive Monitoring

In the digital age, the dark web has emerged as a clandestine marketplace for illicit activities, including the sale of stolen data, illegal software and various forms of malware. The proliferation of these marketplaces poses significant threats to personal, corporate and national security. As…

Posted in Uncategorized | Tagged , , , | Comments Off on Shedding Light on The Dark Web: Enhancing Cybersecurity Through Proactive Monitoring

Transparency in Cybersecurity: The Importance of Accurate Vulnerability Disclosures

Recently, the cybersecurity world has been rattled by a series of critical vulnerabilities discovered in Ivanti Connect Secure VPN software. In the wake of these ongoing vulnerability issues, Ivanti has…

Posted in Uncategorized | Tagged , , , | Comments Off on Transparency in Cybersecurity: The Importance of Accurate Vulnerability Disclosures

Balancing the Scales: Addressing Privacy, Security, and Biases in AI based on the White House Blueprint for an AI Bill of Rights

Within the last few weeks, the major AI competitors OpenAI, Google, and Microsoft unveiled several new products and capabilities of their platforms. Perhaps, most notable was OpenAI’s ability to now…

Posted in Uncategorized | Tagged , , , | Comments Off on Balancing the Scales: Addressing Privacy, Security, and Biases in AI based on the White House Blueprint for an AI Bill of Rights

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter

I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My RSA 2024 started on Sunday, speaking with a group of…

Posted in Uncategorized | Tagged , , , | Comments Off on The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter

Safeguarding The Backbone: The Critical Imperative to Protect Operational Technology (OT) Devices

Introduction Operational Technology (OT) devices, integral in controlling and monitoring industrial processes, have become prime targets for cyberattacks. Since late 2023, there has been a notable increase in attacks on…

Posted in Uncategorized | Tagged , , , | Comments Off on Safeguarding The Backbone: The Critical Imperative to Protect Operational Technology (OT) Devices

Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders

The Federal OT footprint – from military base operations to their public utilities, from postal operations to NASA missions – is immense, which means the potential cyber attack surface is…

Posted in Uncategorized | Tagged , , , | Comments Off on Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders

The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth

Data security and consumer trust go hand-in-hand in our evolving digital world There’s no doubt that data is a catalyst of growth, forcing companies to increasingly rely on it to…

Posted in Uncategorized | Tagged , , , , , | Comments Off on The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth

It Is Time for Smart Cyber Requirements for the Water Sector

Since 2021, the Biden Administration has been consistently talking about the limitations of a purely voluntary approach to cybersecurity for critical infrastructure, and the need for a strategic shift. Among…

Posted in Uncategorized | Tagged , , , , | Comments Off on It Is Time for Smart Cyber Requirements for the Water Sector

Looking Past DevOps: AI, ClickOps and Platform Engineering

About fifteen years ago, DevOps radically overhauled the world of software engineering. Previously, the development process had been defined by sometimes maddening delays, as development teams waited for operations teams…

Posted in Uncategorized | Tagged , , , , , , | Comments Off on Looking Past DevOps: AI, ClickOps and Platform Engineering

The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare

In an alarming revelation, Kaiser Foundation Health Plan reported a data breach impacting over 13 million individuals. For years, there has been an unspoken but critical vulnerability in the healthcare…

Posted in Uncategorized | Tagged , , , , | Comments Off on The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X