Ransomware — Encrypt Your Data Before Others Do
Don’t let them look at your data. By Robert Freudenreich, CTO and Founder, Secomba GmbH | Boxcryptor A single malicious email, with the sender of the mail disguised as a…
The Safest Ways for Bitcoin Trading
By Robert Wilson, Freelancer During the year 2021, we experienced history in the cryptocurrency niche with the 3rd Bitcoin halving event unfolding. There has been unprecedented hype after this news…
The Fragility of a GPS Centric World and the Importance of eLORAN
By Dan Dickey, President, Continental Electronics Corporation Both the importance of GPS systems and their vulnerability to a cyber incident or attack are well understood. What is less understood is…
Why Building Managers Need to Prioritize Cybersecurity
By Shaun Cooley, Founder and CEO of Mapped In an age increasingly dominated by the internet of Things (IoT), buildings have become elaborate networks of software and hardware designed to…
Data Security Must Be a Priority as Employees Quit in Record Numbers
By Tim Sadler, Co-founder and CEO, Tessian The massive labor upheaval that dominated headlines in 2021 shows no signs of slowing down. The latest U.S. jobs report showed that 4.5…
Understanding Identity Detection and Response
Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related information to identify that a malicious attack campaign such as ransomware might…
Killware is the Next Big Cybersecurity Threat
By Brian Erickson, Vice President or Strategy and Solutions and retired U.S. Navy Captain, Vidoori Today’s battlefield has expanded to a digital landscape, and the impact affects the general population…
Why Ransomware is Only a Symptom of a Larger Problem
While ransomware is arguably the greatest current security threat to organizations, its rise has distracted us from the true issue at hand: extortion-based crimes. By Jeff Palatt, Vice President, Technical…
Web Application Penetration Testing Checklist with OWASP Top 10
We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a…
Mitigating Risk from Insider Threats in 2022
By Isaac Kohen, Teramind Back in August 2020, a story of an insider threat caught headlines when the employee turned down a $1M bribe to put ransomware on Tesla’s servers…
How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks
By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder why an article on identity theft appears in Cyber Defense Magazine, and…
How to Protect All Five Stages of the IoT Security Lifecycle
Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate…