Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
cyberdefense magazine
Page 8
cyberdefense magazine
cyberdefense magazine
From Edge to Core: Security in the Data Center
From Edge to Core: Security in the Data Center By Timothy Liu, CTO and Co-Founder, Hillstone...
cyberdefense magazine
You Can’t Prevent Every Attack, But You Can Mitigate the Damage
You Can’t Prevent Every Attack, But You Can Mitigate the Damage More than ever, attackers are...
cyberdefense magazine
Cybersecurity Threats Require More Hands-On Investment by US Oil and Gas Companies
Cybersecurity Threats Require More Hands-On Investment by US Oil and Gas Companies By Martin Riley, Director...
cyberdefense magazine
For Cybercriminals, the Game is On and They’re Playing to Win
For Cybercriminals, the Game is On and They’re Playing to Win Why Football Clubs Need to...
cyberdefense magazine
Four Tips for Health-Care Providers to Stay Cyber Secure
Four Tips for Health-Care Providers to Stay Cyber Secure By Aaron Sandeen, CEO and Co-Founder, CSW...
cyberdefense magazine
Going ‘Passwordless’ Is Not a Simple Process and Should Not Be Rushed
Going ‘Passwordless’ Is Not a Simple Process and Should Not Be Rushed Businesses need to scope,...
cyberdefense magazine
Blockchain Security: Can You Trust This Technology?
Blockchain Security: Can You Trust This Technology? Is Blockchain Technology Really Secure? By Alexandr Khomich, CEO...
cyberdefense magazine
Cybersecurity, Data Management and Insufficient Systems Listed as Top Concerns for Risk Professionals
Cybersecurity, Data Management and Insufficient Systems Listed as Top Concerns for Risk Professionals Diligent is the...
cyberdefense magazine
Continuous Exposure Management: Flipping the Script on Cybersecurity
Continuous Exposure Management: Flipping the Script on Cybersecurity By Brett Kelsey, CEO, Reveald Hackers recently exploited...
cyberdefense magazine
The Rise of Crypto Regulations
The Rise of Crypto Regulations How to Comply Now, and for the Future By Ben Richmond,...
cyberdefense magazine
Blockchain in Retail Will Soon Become a Universal Concept- Explore the Scenario
Blockchain in Retail Will Soon Become a Universal Concept- Explore the Scenario By Koyel Ghosh, Sr....
cyberdefense magazine
Top Legacy Active Directory Infrastructure Vulnerabilities and How Attackers See Them
Top Legacy Active Directory Infrastructure Vulnerabilities and How Attackers See Them By Tammy Mindel, Security Product...
cyberdefense magazine
The Numbers Are In: Identity-Based Attacks (Still) Reign Supreme in 2022
The Numbers Are In: Identity-Based Attacks (Still) Reign Supreme in 2022 By Greg Notch, CISO, Expel...
cyberdefense magazine
The Importance of Responsible E-Waste Disposal for Enterprise Cybersecurity
The Importance of Responsible E-Waste Disposal for Enterprise Cybersecurity An Outline of the Importance of Proper...
cyberdefense magazine
Why Cybersecurity Is Critical for ESG
Why Cybersecurity Is Critical for ESG Cyber-Awareness Can Help Companies Meet Esg Obligations By Shaun McAlmont,...
cyberdefense magazine
The Growing Importance of VPNs
The Growing Importance of VPNs By Izzy Murphy, Reporter for TechRound There are many advantages which...
cyberdefense magazine
Zero-Trust Needs to be a Priority – For SaaS, Too
Zero-Trust Needs to be a Priority – For SaaS, Too By Misha Seltzer, Co-Founder and CTO...
cyberdefense magazine
Web3, Good Hygiene, and the Need for End-to-End Security
Web3, Good Hygiene, and the Need for End-to-End Security By Professor Ronghui Gu, CEO, CertiK Having...
cyberdefense magazine
The Fight Against Fraud Continues
The Fight Against Fraud Continues A closer look at biometric authentication technology By Brett Beranek, Vice-President...
cyberdefense magazine
Addressing the Unique Obstacles in Healthcare Through Policy-Based Access Control
Addressing the Unique Obstacles in Healthcare Through Policy-Based Access Control By Gal Helemski, Co-Founder and CTO,...
cyberdefense magazine
The Cost of a Siloed Response: How a Lack of Collaboration is Becoming Security’s Biggest Vulnerability
The Cost of a Siloed Response: How a Lack of Collaboration is Becoming Security’s Biggest Vulnerability...
cyberdefense magazine
Organizations Should Break into Their Own Networks
Organizations Should Break into Their Own Networks By John Meyer, Arcfield VP, Cyber Products and Services...
cyberdefense magazine
The Future of Attack Surface Management: How to Prepare
The Future of Attack Surface Management: How to Prepare By David Monnier, Team Cymru Fellow To...
cyberdefense magazine
CISA’s Strategic Plan: A Step in the Right Direction
CISA’s Strategic Plan: A Step in the Right Direction By Gary Barlet, Federal Chief Technology Officer,...
cyberdefense magazine
VIP3R: Dissecting A New Venomous Spearphishing Campaign
VIP3R: Dissecting A New Venomous Spearphishing Campaign By Tom McVey, Solution Architect at Menlo Security Social...
cyberdefense magazine
Software-Defined Radio for Incident Response
Software-Defined Radio for Incident Response By Brendon McHugh, FAE & Technical Writer, Per Vices Wireless technology...
cyberdefense magazine
The 6 Biggest Financial Sector Cybersecurity Threats in 2022
The 6 Biggest Financial Sector Cybersecurity Threats in 2022 By Veniamin Semionov, Director of Product Management,...
cyberdefense magazine
The Artificial Intelligence Tug-of-War: Adversaries vs. Defenders
The Artificial Intelligence Tug-of-War: Adversaries vs. Defenders By Corey Nachreiner, CSO at WatchGuard Technologies Artificial intelligence...
cyberdefense magazine
The Balance of Power: One Disturbance Could Ignite The First Cyber World War
The Balance of Power: One Disturbance Could Ignite The First Cyber World War By Guy Golan,...
cyberdefense magazine
Russia’s Invasion of Ukraine Lays Ground for a New Era of Cyberwarfare
Russia’s Invasion of Ukraine Lays Ground for a New Era of Cyberwarfare Russia is known to...
Posts navigation
1
…
7
8
9
…
11
Latest News
The Register Security
Ransomware feared as IT ‘issues’ force Octapharma Plasma to close 150+ centers – Source: go.theregister.com
18/04/2024
The Register Security
Crooks exploit OpenMetadata holes to mine crypto – and leave a sob story for victims – Source: go.theregister.com
18/04/2024
The Register Security
House passes bill banning Uncle Sam from snooping on citizens via data brokers – Source: go.theregister.com
18/04/2024
The Register Security
Korean researcher details scheme abusing Apple’s third-party pickup policy – Source: go.theregister.com
18/04/2024
The Register Security
185K people’s sensitive data in the pits after ransomware raid on Cherry Health – Source: go.theregister.com
18/04/2024
The Register Security
EU tells Meta it can’t paywall privacy – Source: go.theregister.com
18/04/2024