Source: www.cyberdefensemagazine.com – Author: News team By Aaron Bray, CEO. Phylum Cybersecurity has changed dramatically in the last four years. During the pandemic, organizations around the...
Author:
SAP Debugger’s Power and Danger – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar...
Blockchain Startups Are Drawing Substantial Venture Capital Funding – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights Blockchain technology is becoming more popular owing to the various...
Advancements in AI Cybersecurity: Leveraging ChatGPT to Stay Ahead of Cyber Criminals – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Brian Sathianathan, Co-Founder and CTO of Iterate.ai As our world becomes more and more digitized, the threat of cyber-attacks...
A CEO’s Guide to Not Becoming the Next Cyberattack Headline – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Sheetal Pansare, President & Global CEO of Futurism Technologies Imagine you are a CEO waking up to a Class-action...
2023 Predictions – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Anurag Gurtu, Chief Product Officer at Strike Ready In 2022, the global average total breach cost surpassed $4.35M, and...
Strengths and Vulnerabilities of AI Applications to Health Care – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Edward Maule, Chief Information Officer and Chief Information Security Officer at Advocare, LLC Artificial intelligence (AI) has made significant...
ChatGPT and You – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer at Sangfor Technologies Okay, I admit the...
How To Survive a Ransomware Attack and Fix Ransomware Breach Face – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Derek Nugent, Vice President of Revenue at Difenda Ransomware attacks have become a growing concern for businesses and individuals...
Going into the Darknet: How Cynet Lighthouse Services Keep Cybersecurity Teams One Step Ahead of Hackers – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By monitoring the darknet, as well as underground forums, Cynet is able to identify and prepare for the latest cybersecurity...
Security Tool Integration Isn’t Enough Anymore – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Manoj Arora, Founder & CEO, Difenda Organizations today are overwhelmed with options when it comes to security tools and...
Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Kaustubh Medhe, Head of Research and Intelligence at Cyble Cybercriminal motivations rarely change over time. A typical cyberattack is...
Complexity is Still the Enemy of Security – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Ease of Use, Ease of Integration Encourages Data Protection By Gregory Hoffer, CEO of Coviant Software In 1999 noted cybersecurity...
Enhance Employee Productivity by Adopting a Modern Approach to Password Security – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Joshua Parsons, Product Marketing Manager at Enzoic For decades, enterprise security measures and employee productivity were seemingly at odds....
OT Zero Trust
The Last Frontier to Protect OT Environments By Terence Liu, CEO, TXOne Networks OT Zero Trust – a Device-Centric Methodology In the IT world, the heart...
It’s 2023 – You MUST Know The SaaS Applications Your Employees Are Using
Organizations should have free access to their SaaS attack layer By Galit Lubetzky Sharon, Co-Founder & CTO, Wing Security While security budgets were not the first...
How to Protect Your Ecommerce Site from Cybersecurity Threats
By Karl Pulanco, Product Portfolio Manager, Yondu Modern businesses no longer need a physical store to sell goods and services. All they need now is an...
ChatGPT and You
Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer, Sangfor Technologies Okay, I admit the title is clickbait to get you to...
2023: What Awaits Us?
By Ashley Stephenson, CTO, Corero Network Security When it comes to cyber security, one thing that 2022 and just about any recent year will be remembered...
The Practical Side of ZTNA: How it Helps Harden Defenses
By Timothy Liu, CTO and co-founder, Hillstone Networks In the cybersecurity world, buzzwords seem proliferate with the changing of the wind. Currently zero-trust network access, or...
Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
By Tyler Farrar, CISO, Exabeam According to the Exabeam State of the SIEM survey, security professionals remain confident in the face of modernizing adversaries despite rising...
Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework
By Kaustubh Medhe, Head of Research and Intelligence A recent market survey report (Source: Fortune Business Insights, March 2023) pegged the current market size of the...
Cloud Visibility and Port Spoofing: the “Known Unknown”
By Stephen Goudreault, Cloud Security Evangelist, Gigamon As with all technology, new tools are iterations built on what came before and classic network logging and metrics...
Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.
By Dan Richings – Senior Vice President, Global Presales, Solutions Engineering, and Support – Adaptiva Using third-party software is unavoidable in today’s market. The competition and...
As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security
By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to determine how adversaries’ strategies are changing...
Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security leaders mature their program By Robert...
Next Generation Cybersecurity for Small to Midsize Businesses
How Cynet is giving lean security teams the tools they need to protect their business as budget crunches and reduced headcounts put many companies at risk...
Eight Tips for CISOs Trying Get Their Board on Board
By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role in strategic decision-making in enterprises. Yet...
Zero Trust in a DevOps World
By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical to securing people, devices, infrastructure, and...
Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”
By James Hess, CEO of Unknown Cyber Cybersecurity is a critical issue that affects organizations of all sizes and industries, but it can be particularly challenging...