Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Why Building Managers Need to Prioritize Cybersecurity

By Shaun Cooley, Founder and CEO of Mapped In an age increasingly dominated by the internet of Things (IoT), buildings have become elaborate networks of software and hardware designed to…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on Why Building Managers Need to Prioritize Cybersecurity

Data Security Must Be a Priority as Employees Quit in Record Numbers

By Tim Sadler, Co-founder and CEO, Tessian The massive labor upheaval that dominated headlines in 2021 shows no signs of slowing down. The latest U.S. jobs report showed that 4.5…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Data Security Must Be a Priority as Employees Quit in Record Numbers

Why Ransomware is Only a Symptom of a Larger Problem

While ransomware is arguably the greatest current security threat to organizations, its rise has distracted us from the true issue at hand: extortion-based crimes. By Jeff Palatt, Vice President, Technical…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on Why Ransomware is Only a Symptom of a Larger Problem

Web Application Penetration Testing Checklist with OWASP Top 10

We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Web Application Penetration Testing Checklist with OWASP Top 10

Mitigating Risk from Insider Threats in 2022

By Isaac Kohen, Teramind Back in August 2020, a story of an insider threat caught headlines when the employee turned down a $1M bribe to put ransomware on Tesla’s servers…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Mitigating Risk from Insider Threats in 2022

How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks

By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder why an article on identity theft appears in Cyber Defense Magazine, and…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks

How to Protect All Five Stages of the IoT Security Lifecycle

Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate…

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on How to Protect All Five Stages of the IoT Security Lifecycle

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X