Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

The Other Lesson from the XZ Utils Supply-Chain Attack

“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in the case of the recent XZ Utils case, it was…

Posted in Uncategorized | Tagged , , , , | Comments Off on The Other Lesson from the XZ Utils Supply-Chain Attack

Unlocking the Power of Behavioral Cloud Native Threat Detection and Response

Behavioral detection and response is not a new concept, and the top three detection and response players command a combined market capitalization of $100 billion. But the rise of cloud…

Posted in Featured | Tagged , , , | Comments Off on Unlocking the Power of Behavioral Cloud Native Threat Detection and Response

Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management

The massive Snowflake breach disclosed recently, involving hundreds of millions of stolen customer records, is a stark wake-up call for organizations to proactively manage their SaaS security. No doubt the…

Posted in Featured | Tagged , , , , , | Comments Off on Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management

How the Newest Tech Changes Cybersecurity Needs in the Legal Industry

Responsibly Adopting Technology to Improve Law Firm Productivity Lawyers face incredible pressure in their jobs to perform accurately and quickly. Thankfully, technology has been introduced that now allows legal professionals…

Posted in Featured | Tagged , , | Comments Off on How the Newest Tech Changes Cybersecurity Needs in the Legal Industry

The First 10 Days of a vCISOs Journey with a New Client

“In a quaint village nestled between rolling hills and dense forests, a young apprentice named Eli was learning to throw pottery from a master potter. On the first day by…

Posted in Featured | Tagged , , , | Comments Off on The First 10 Days of a vCISOs Journey with a New Client

How to Hunt for Volt Typhoon Malware in Critical Infrastructure

🚨🔍 Don’t miss out on the Hunt for Volt Typhoon event! 🌐💻 Join us to explore cutting-edge cyber tactics, innovative defense strategies, and the latest in threat detection. Perfect for…

Posted in Featured | Tagged , , , , , , | Comments Off on How to Hunt for Volt Typhoon Malware in Critical Infrastructure

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding ransom. Ransomware is a type of malicious software designed to…

Posted in Featured, Popular | Tagged , , , , , , , | Comments Off on Why Do Hackers Love Cryptocurrency?

What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform

By Tom Tovar, Co-creator and CEO of Appdome There’s a major battle brewing between platform vs. platformization companies in cybersecurity. On either side, cybersecurity heavyweights are racing to offer fully…

Posted in Featured | Tagged , , , | Comments Off on What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform

Celebrating our 12th Anniversary at RSA conference 2024

It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with us for over a decade. I remember before we went…

Posted in Featured | Tagged , , , , , | Comments Off on Celebrating our 12th Anniversary at RSA conference 2024

Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

Nick Shevelyov, Senior Executive Reporter, Cyber Defense Magazine On February 7, 2024, the US Government Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory titled “PRC State-Sponsored Actors Compromise and…

Posted in Featured | Tagged , , , , , , | Comments Off on Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

CISO Life: the Good, the Bad, the Ugly

What type of things can go wrong with Senior Leadership, the Org, Legal, HR, etc. by Dan K. Anderson In today’s hectic Cyber world, the role of CISO continues to…

Posted in Featured | Tagged , , , , | Comments Off on CISO Life: the Good, the Bad, the Ugly

A 5-Minute Refresher to Cryptography

 (featuring Alice and Bob) by Rajvi Shroff It’s an age-old question. Alice wants to send a message to Bob. But how can Alice send it to Bob without Eve, the…

Posted in Featured | Tagged , | Comments Off on A 5-Minute Refresher to Cryptography

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X