Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Posted in Featured, Popular | Tagged , , , , , , , | Comments Off on Why Do Hackers Love Cryptocurrency?

Strengthening Cyber Defense with Threat Intelligence Operations

By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to…

Posted in Featured | Tagged , , , | Comments Off on Strengthening Cyber Defense with Threat Intelligence Operations

Celebrating our 12th Anniversary at RSA conference 2024

It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with us for over a decade. I remember before we went…

Posted in Featured | Tagged , , , , , | Comments Off on Celebrating our 12th Anniversary at RSA conference 2024

UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

In an alarming revelation, officials from the Minnesota-based UnitedHealth Group disclosed on Monday that the health insurance and services giant fell victim to a cyberattack, resulting in the breach of…

Posted in Featured | Tagged , , , , | Comments Off on UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure

by Lena Allen Introduction In this era of unprecedented technological interconnectedness, the safeguarding of critical infrastructure against cyber threats has ascended to a pinnacle of national security importance for the…

Posted in Featured | Tagged , | Comments Off on Safeguarding America’s Future: Mitigating the Implications of Chinese Control Over U.S. Critical Infrastructure

OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft

Securing Operational Technology ACCESS THE RECORDING Kick-start your OT security program, wherever you are in your journey. Gain industry-specific insights into OT cybersecurity challenges and equip yourself with practical strategies…

Posted in Featured | Tagged , , , | Comments Off on OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft

Halting Hackers on the Holidays 2023

by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive…

Posted in Featured | Tagged , , , | Comments Off on Halting Hackers on the Holidays 2023

Publishers Spotlight: The Syndicate Group (TSG)

The Syndicate Group (TSG) is a leading venture firm focused on revenue growth and new customer acquisition. Leveraging an ecosystem of strategic investors including more than 450 leading channel partner…

Posted in Featured | Tagged , , , | Comments Off on Publishers Spotlight: The Syndicate Group (TSG)

Spotlight: Whitepaper: Information security for the medical device industry

With a focus on the medical device industry, this paper provides software developers, hardware developers, and manufacturers with an understanding of the necessity and benefits of cybersecurity preparedness that can…

Posted in Featured | Tagged , , , , , | Comments Off on Spotlight: Whitepaper: Information security for the medical device industry

Passive Optical Networks: A Game Changer for Now And The Future

By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC The Department of Defense (DoD) faces challenges in meeting network…

Posted in Featured | Tagged , , , | Comments Off on Passive Optical Networks: A Game Changer for Now And The Future

Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through unlimited in-depth investigation, and rapidly respond to incidents. Radiant Security…

Posted in Featured | Tagged , , , , | Comments Off on Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection

Dataminr delivers the earliest warnings on high impact events, emerging risks, threats, and other critical information far in advance of other sources. Recognized as one of the world’s leading AI…

Posted in Featured | Tagged , , , | Comments Off on Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection

Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio

When it comes to cybersecurity, the landscape is full of single-solution providers, making it easy for unexpected cyberthreats to sneak through the cracks. Fortra is creating a stronger, simpler strategy…

Posted in Featured | Tagged , , , | Comments Off on Publisher’s Spotlight: Fortra: Best-in-Class Cybersecurity Portfolio

Publisher’s Spotlight: IANS: Providing Expert Guidance to CISOs and their Teams

IANS Research has been working for the last two decades to create a way for InfoSec practitioners to collaborate in ways that are often difficult in other settings. The IANS…

Posted in Featured | Tagged , , , , , | Comments Off on Publisher’s Spotlight: IANS: Providing Expert Guidance to CISOs and their Teams

Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance Program

RegScale is a Modern GRC platform, delivering a simplified, integrated and scalable solution to meet the speed and real-time demands of the digital enterprise. The current manual and document-based approach…

Posted in Featured | Tagged , , , , | Comments Off on Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance Program

Publisher’s Spotlight: Security Journey: Secure Coding Training

Security Journey is a secure coding education provider that is focused on addressing the evolving landscape of cybersecurity threats with comprehensive and engaging training. As security awareness has become a…

Posted in Featured | Tagged , , , , , | Comments Off on Publisher’s Spotlight: Security Journey: Secure Coding Training

Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model

Arctic Wolf is a global leader in security operations, enabling customers to manage their cyber risk in the face of modern cyberattacks. Our Arctic Wolf Security Operations Cloud ingests and…

Posted in Featured | Tagged , , | Comments Off on Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model

Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection

CrowdSec is a modern, collaborative cybersecurity company committed to proactively safeguarding digital assets. With a growing community of 65,000+ active installations contributing to a robust, constantly-updated global IP reputation database…

Posted in Uncategorized | Tagged , , | Comments Off on Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection

Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter

Today’s cyber attackers are looking beyond network systems and devices to target organizations through digital platforms outside your perimeter. It’s time to detect, expose, and disrupt these external threats to…

Posted in Featured | Tagged , , | Comments Off on Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter

Publisher’s Spotlight: Cigent: Make Your Data Invisible

Cigent Technologies is a data security company that is renowned for their data protection  capabilities. They’ve had a long-standing relationship with the U.S. government and have been a trusted resource…

Posted in Featured | Tagged , , , | Comments Off on Publisher’s Spotlight: Cigent: Make Your Data Invisible

Log4j Showed Us That Public Disclosure Still Helps Attackers.

Public disclosure is still a bit of a mess By Alex Haynes, CISO, CDL At 2:25 pm on the 9th of December an infamous (now deleted) tweet linking a 0-day…

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on Log4j Showed Us That Public Disclosure Still Helps Attackers.

Cybersecurity, Especially in Critical Infrastructure and State Government, Is A Huge Issue Right Now

There is little doubt that continued effort at all levels across infrastructure and government is required to ensure the resilience required is in place By Ben Lane, Events Manager, Torch…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Cybersecurity, Especially in Critical Infrastructure and State Government, Is A Huge Issue Right Now

Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service industry

Technological progress also enhances the danger of cyber threats By C. Max Farrell¸ senior technical marketing specialist & Chiyi Lin, product line manager TXOne Networks Until about ten years ago,…

Posted in Uncategorized | Tagged , , , , , , , | Comments Off on Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service industry

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...

X