Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

How to Hunt for Volt Typhoon Malware in Critical Infrastructure

🚨🔍 Don’t miss out on the Hunt for Volt Typhoon event! 🌐💻 Join us to explore cutting-edge cyber tactics, innovative defense strategies, and the latest in threat detection. Perfect for…

Posted in Featured | Tagged , , , , , , | Comments Off on How to Hunt for Volt Typhoon Malware in Critical Infrastructure

Strengthening Cyber Defense with Threat Intelligence Operations

By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to…

Posted in Featured | Tagged , , , | Comments Off on Strengthening Cyber Defense with Threat Intelligence Operations

What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform

By Tom Tovar, Co-creator and CEO of Appdome There’s a major battle brewing between platform vs. platformization companies in cybersecurity. On either side, cybersecurity heavyweights are racing to offer fully…

Posted in Featured | Tagged , , , | Comments Off on What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform

Celebrating our 12th Anniversary at RSA conference 2024

It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with us for over a decade. I remember before we went…

Posted in Featured | Tagged , , , , , | Comments Off on Celebrating our 12th Anniversary at RSA conference 2024

UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

In an alarming revelation, officials from the Minnesota-based UnitedHealth Group disclosed on Monday that the health insurance and services giant fell victim to a cyberattack, resulting in the breach of…

Posted in Featured | Tagged , , , , | Comments Off on UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

Nick Shevelyov, Senior Executive Reporter, Cyber Defense Magazine On February 7, 2024, the US Government Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory titled “PRC State-Sponsored Actors Compromise and…

Posted in Featured | Tagged , , , , , , | Comments Off on Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure

by Lena Allen Introduction In this era of unprecedented technological interconnectedness, the safeguarding of critical infrastructure against cyber threats has ascended to a pinnacle of national security importance for the…

Posted in Featured | Tagged , | Comments Off on Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure

CISO Life: the Good, the Bad, the Ugly

What type of things can go wrong with Senior Leadership, the Org, Legal, HR, etc. by Dan K. Anderson In today’s hectic Cyber world, the role of CISO continues to…

Posted in Featured | Tagged , , , , | Comments Off on CISO Life: the Good, the Bad, the Ugly

OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft

Securing Operational Technology ACCESS THE RECORDING Kick-start your OT security program, wherever you are in your journey. Gain industry-specific insights into OT cybersecurity challenges and equip yourself with practical strategies…

Posted in Featured | Tagged , , , | Comments Off on OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft

Halting Hackers on the Holidays 2023

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive…

Posted in Featured | Tagged , , , | Comments Off on Halting Hackers on the Holidays 2023

Spotlight: Whitepaper: Information security for the medical device industry

With a focus on the medical device industry, this paper provides software developers, hardware developers, and manufacturers with an understanding of the necessity and benefits of cybersecurity preparedness that can…

Posted in Featured, Spotlight | Tagged , , , , , | Comments Off on Spotlight: Whitepaper: Information security for the medical device industry

Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through unlimited in-depth investigation, and rapidly respond to incidents. Radiant Security…

Posted in Featured, Spotlight | Tagged , , , , | Comments Off on Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X