Doenerium: When Stealing from Thieves Is Also a CrimeBy Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’...
Category: cyberdefensemagazine
Five Ways to Keep Endpoint Protection Simple
Five Ways to Keep Endpoint Protection SimpleBy Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve....
The Rise in Cyber-Attacks from Bad International Actors
The Rise in Cyber-Attacks from Bad International ActorsThere has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems...
How 5G Networks Are Secured and Enabled By SASE
How 5G Networks Are Secured and Enabled By SASEBy Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll...
How Does a Botnet Attack Work?
How Does a Botnet Attack Work?By Zac Amos, Features Editor, ReHack Keeping up with cybercriminals is a full-time job, as new attack types appear daily. Cybersecurity...
How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce
How To Reduce Rising Cyber Insurance Costs When You Have a Remote WorkforceBy Raul Popa, CEO & Co-Founder, TypingDNA Like other types of insurance, Cybersecurity Insurance...
Mobile App APIs Are Crucial to Businesses – But Are Under-Protected
Mobile App APIs Are Crucial to Businesses – But Are Under-ProtectedThe State of Mobile Security in 2022” Underscores Both the Importance of Mobile Apps and the...
Infrastructure-as-Code Security: a Critical Responsibility
Infrastructure-as-Code Security: a Critical ResponsibilityBy Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries. Although its...
Remote Workers Face Growing Threats from Phishing Attacks
Remote Workers Face Growing Threats from Phishing AttacksAnalysis Shows Phishing Strikes Up 61% Over 2021, With a 50% Increase on Mobile Devices By Patrick Harr, CEO,...
Managing Cybersecurity for Critical National Infrastructure
Managing Cybersecurity for Critical National InfrastructureGeneral guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant, Artech,...
Infrastructure-as-Code Security: a Critical Responsibility
Infrastructure-as-Code Security: a Critical ResponsibilityBy Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries. Although its...
Dark Clouds Could Be Looming
Dark Clouds Could Be LoomingCyberattacks in the cloud are often overlooked and increasingly important By Bence Jendruszak, Co-Founder and COO, SEON Most […] The post Dark...