Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
cyberdefense magazine
cyberdefense magazine
Making the most of your time at the RSA 2023 conference
Making the most of your time at the RSA 2023 conference Ben Rothke, CISSP, CISM, CISA,...
cyberdefense magazine
Has Adoption of ‘Connected Devices’ Outpaced Security?
Has Adoption of ‘Connected Devices’ Outpaced Security? By Scott Register, Vice President, Security Solutions, Keysight Technologies...
cyberdefense magazine
How to Stay GDPR Compliant While Sending Cold Emails
How to Stay GDPR Compliant While Sending Cold Emails Understand the limits of data consent when...
cyberdefense magazine
Europe Envies America’s Cybersecurity Industry. What Can We Learn from It?
Europe Envies America’s Cybersecurity Industry. What Can We Learn from It? Europe’s cyber industry has huge...
cyberdefense magazine
Expanding Macroeconomic Pressure And Attack Surface Will Drive Security Automation In 2023
Expanding Macroeconomic Pressure And Attack Surface Will Drive Security Automation In 2023 By Leonid Belkind, CTO...
cyberdefense magazine
Cybersecurity: Your Guide to Digital Identity
Cybersecurity: Your Guide to Digital Identity Digital identity is an extra layer of security needed to...
cyberdefense magazine
Does Your Company Have a Dark Data Problem?
Does Your Company Have a Dark Data Problem? By Dannie Combs, SVP and Chief Information Security...
cyberdefense magazine
Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush?
Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush? By Camellia Chan, CEO & founder of...
cyberdefense magazine
Cybersecurity Attacks To Come: Here’s How To Prepare
Cybersecurity Attacks To Come: Here’s How To Prepare By Russ Reeder, CEO, Netrix Global Ensuring 100%...
cyberdefense magazine
Busting Myths Around Cybersecurity Team Training
Busting Myths Around Cybersecurity Team Training New Research Results from Omdia and Cybrary Point to Substantial...
cyberdefense magazine
5 Best Practices for a Multi-Factor Authentication (MFA) Strategy
5 Best Practices for a Multi-Factor Authentication (MFA) Strategy By Zac Amos, Features Editor, ReHack Organizations...
cyberdefense magazine
2023 Predictions
2023 Predictions By Dr. Chenxi Wang, Founder and Managing General Partner, Rain Capital For venture capitalists...
cyberdefense magazine
New Threat Report Shows Attackers Increasingly Exploiting MFA Fatigue
New Threat Report Shows Attackers Increasingly Exploiting MFA Fatigue By Ben Brigida, Director, Security Operations, Expel...
cyberdefense magazine
The Future of Online Privacy
The Future of Online Privacy By Mia Naumoska, Chief Marketing Officer at Internxt You’ve probably noticed...
cyberdefense magazine
Why Ransomware Costs Need to be Prioritized in Your 2023 Budget
Why Ransomware Costs Need to be Prioritized in Your 2023 Budget By Anurag Lal, CEO and...
cyberdefense magazine
4 Key Security Trends For 2023
4 Key Security Trends For 2023 By Jonathan Lee, Senior Product Manager, Menlo Security 2022 has...
cyberdefense magazine
Top 100 CISOs
Top 100 CISOs These CISOs competed against thousands of candidates for this prestigious award. Judges...
cyberdefense magazine
Top 100 Women in Cybersecurity
Top 100 Women in Cybersecurity Abbott Ekta Sirwani https://www.linkedin.com/in/ekta-sirwani/ Absolute Christy Wyatt https://www.linkedin.com/in/christywyatt/ Alert Logic Sydna...
cyberdefense magazine
Cyber Defense Magazine– PQC & Biometrics
Cyber Defense Magazine– PQC & Biometrics Why biometric security is crucial in a post-quantum world By...
cyberdefense magazine
Virtual Security and why it matters so much to SMEs
Virtual Security and why it matters so much to SMEs By Jack Viljoen, Head of Marketing,...
cyberdefense magazine
Why “Point-In-Time” Solutions Are Losing The Battle Against Sophisticated Fraud
Why “Point-In-Time” Solutions Are Losing The Battle Against Sophisticated Fraud By Alisdair Faulkner, CEO at Darwinium...
cyberdefense magazine
Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
Organizations Have Security Priorities Mismatched as Breaches Continue to Rise By Tyler Farrar, CISO, Exabeam According...
cyberdefense magazine
Why Finding The Right Load Balancing Solution Is Crucial For Hybrid Cloud
Why Finding The Right Load Balancing Solution Is Crucial For Hybrid Cloud By Jason Dover, VP...
cyberdefense magazine
Why Low-Code AI Is Needed Now More Than Ever
Why Low-Code AI Is Needed Now More Than Ever By Solomon Ray, Director of Innovation, Strategy,...
cyberdefense magazine
SMB Cyber Insurance: The End of Innocence
SMB Cyber Insurance: The End of Innocence By Nadav Arbel, Co-founder & CEO, CYREBRO The cyber...
cyberdefense magazine
Why Power Matters in Cyber Protection
Why Power Matters in Cyber Protection Defending power management equipment in an era of more connectivity...
cyberdefense magazine
Doenerium: When Stealing from Thieves Is Also a Crime
Doenerium: When Stealing from Thieves Is Also a Crime By Igal Lytzki, Incident Response Analyst, Perception...
cyberdefense magazine
Five Ways to Keep Endpoint Protection Simple
Five Ways to Keep Endpoint Protection Simple By Ashley Leonard, CEO, Syxsense Endpoint security continues to...
cyberdefense magazine
The Rise in Cyber-Attacks from Bad International Actors
The Rise in Cyber-Attacks from Bad International Actors There has been a rise in cyber-attacks on...
cyberdefense magazine
How 5G Networks Are Secured and Enabled By SASE
How 5G Networks Are Secured and Enabled By SASE By Kelly Ahuja, Versa Networks CEO As...
Posts pagination
1
…
20
21
22
…
26
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025