Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.
Nick Shevelyov, Senior Executive Reporter, Cyber Defense Magazine On February 7, 2024, the US Government Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory titled “PRC State-Sponsored Actors Compromise and […]
CISO Life: the Good, the Bad, the Ugly
What type of things can go wrong with Senior Leadership, the Org, Legal, HR, etc. by Dan K. Anderson In today’s hectic Cyber world, the role of CISO continues to […]
Smart Traffic Signals Security in the Era of AI and Smart Cars
Analyzing the Trade-off Between Efficiency and Security in Smart Traffic Signal Technology Integration. by Samridhi Agarwal, Masters Student, CMU Once a simple concept with red, yellow, and green bulbs, traffic […]
OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft
Securing Operational Technology ACCESS THE RECORDING Kick-start your OT security program, wherever you are in your journey. Gain industry-specific insights into OT cybersecurity challenges and equip yourself with practical strategies […]
Halting Hackers on the Holidays 2023 Part II: The Apps You (Shouldn’t) Trust
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine Read Part I first: Halting Hackers on the Holidays 2023 – Cyber Defense Magazine As we count the breaches and total […]
Halting Hackers on the Holidays 2023
by Gary S. Miliefsky, Publisher of Cyber Defense Magazine As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive […]
There Are Cyberheroes: THE VIGILANCE MANIFESTO
A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI In the vast expanse of the digital realm, where shadows […]
Passive Optical Networks: A Game Changer for Now And The Future
By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC The Department of Defense (DoD) faces challenges in meeting network […]
Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem
Each year, the cybersecurity industry anticipates a handful of landmark research that informs the market regarding benchmarking best practices, understanding emerging trends, and innovation breakthroughs. The annual AT&T Cybersecurity Insights(TM) […]
Publishers Spotlight: Nisos: Your Managed Intelligence Partner
Nisos is the Managed Intelligence™ team you need to consider working with to solve your most complex security challenges. They deliver smarter defense and more effective responses against advanced cyber […]
Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs
CyTwist has launched its Preemptive Cyber Attack Management Platform (PCAM) to enable defenders to expose attacks early and accurately while creating efficiencies in the SOC. They are building a platform […]
Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection
CrowdSec is a modern, collaborative cybersecurity company committed to proactively safeguarding digital assets. With a growing community of 65,000+ active installations contributing to a robust, constantly-updated global IP reputation database […]
Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter
Today’s cyber attackers are looking beyond network systems and devices to target organizations through digital platforms outside your perimeter. It’s time to detect, expose, and disrupt these external threats to […]
Publisher’s Spotlight: Cigent: Make Your Data Invisible
Cigent Technologies is a data security company that is renowned for their data protection capabilities. They’ve had a long-standing relationship with the U.S. government and have been a trusted resource […]
Improve Data Security Through Automation
Human error is endemic to data breaches. Process automation can minimize the risk. By Gregory Hoffer, CEO, Coviant Software Human error is the most common cause of a data breach, […]
Top 10 Node.Js Security Best Practices
Best Security Practices in Nodejs By Harikrishna Kundariya, CEO, eSparkBiz Node.js is one of the most popular frameworks for web and mobile application development. It is JavaScript runtime which works […]
The Seven Deadly Sins of Blockchain Security
By Professor Ronghui Gu, Co-Founder, CertiK Blockchain is, at heart, a security technology. Distributed Ledger Technology (DLT) is essentially an improved method of record-keeping, one which achieves a consensus shared […]
The Quantum Tipping Point
Fixing Cryptography Before It Is Broken By Carmen Kempka, Head of Corporate Technology, WIBU-SYSTEMS AG Ever since Peter Shor showed how a quantum computer could factorize large numbers with exponential […]
Half of Organizations Have Experienced a Cyber Attack on Their Critical IT Assets
By Diem Shin, Product Marketing Lead at Telos Corporation Today’s organizations are cloud-centric and are more connected than ever before. Many organizations are ladened with legacy systems and complex IT […]
Three Ways IP Data Enhances Cyber Security
By Jonathan Tomek, VP of Research and Development, Digital Envoy Cyber security professionals were never worry-free; there are simply too many nefarious players who have much to gain by hacking […]
Cybersecurity, Especially in Critical Infrastructure and State Government, Is A Huge Issue Right Now
There is little doubt that continued effort at all levels across infrastructure and government is required to ensure the resilience required is in place By Ben Lane, Events Manager, Torch […]
Monetized ransomware: emergent cyber threats and rise of the Ransomware-as-a-Service industry
Technological progress also enhances the danger of cyber threats By C. Max Farrell¸ senior technical marketing specialist & Chiyi Lin, product line manager TXOne Networks Until about ten years ago, […]
Lessons Learned: In the Principle Of “Least Privilege,” Where Do Companies Fall Short?
By Raj Dodhiawala, President, Remediant Lateral movement using compromised admin credentials is integral to almost all ransomware and malware attacks today. Specifically exploiting privilege sprawl—or the always-on, always-available administrative access […]
5 Ways Cybersecurity Will Change In 2022
By Jaime Coreano, Vice President of Sales – Flexxon The annual cost of cybercrime is set to hit $10.5 trillion by 2025. The losses caused by theft, fraud and embezzlement […]
How to Fix Mid-Market Security Using Intelligent Automation and AI
By Guy Moskowitz, CEO, Coro Market forces are working against medium-sized businesses, leaving companies that don’t have large, dedicated security teams and fat cyber security budgets exposed to cyber threats. […]
On The Frontline in The War Against Hackers
By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift toward remote work, crime is moving from physical space to cyberspace. Businesses are conducting […]
Biggest Cyber Trend in 2022
You Can’t Fix Stupid By Guy Rosefelt, CPO, Sangfor Technologies Stop me if you have heard this one: a customer is working late at night, has been a long day, […]
Are You Prepared for the New Normal of Jekyll and Hyde Data?
An organization’s data and secrets are simultaneously its greatest assets and its greatest risks. By Howard Ting, CEO, Cyberhaven Recently Twitch suffered a devastating hack that exposed its most sensitive […]
Phishing Techniques in Disguise: What to Look for And Why You Should
By Rotem Shemesh, Lead Product Marketing Manager, Security Solutions, at Datto Phishing is a familiar concept to cybersecurity professionals – and hackers. According to a recent study, phishing attacks are […]
Directed Analytics – The Future of Data Management
By Simon Rolph, CEO & Founder of Such Sweet Thunder The world as we know it has changed – it’s undisputed. Industries of all kinds face a wholly different landscape […]