Operational Resilience – Cyber Defense Magazine
Introduction In the business world, operational resilience can be compared to the physical concept of resilience, which defines the ability of a material to return…
Introduction In the business world, operational resilience can be compared to the physical concept of resilience, which defines the ability of a material to return…
The notorious Tycoon 2FA phishing kit continues its evolution with new strategies designed to slip past endpoint detection systems. This development was highlighted in a…
I’ve been thinking a lot about what matters in life recently–specifically about focusing in on the things that matter, and trimming much of the rest.…
The scale of cyberattacks seen today is both unprecedented and harrowing. Crucial sectors including healthcare, finance, and education have found themselves increasingly under attack, with…
Threat actors are using open-source software (OSS) repositories to install malicious code into trusted applications, particularly targeting cryptocurrency software. The ReversingLabs (RL) research team has…
This is an interesting piece over at the Audacious Epigone. It shows that the deeply religious worry the least, which makes perfect sense to me.…
In today’s interconnected business world, organizations rely on a vast web of third-party vendors, suppliers, and partners. While these relationships are essential for growth and…
Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers, following a trend noted in Forescout Research Vedere Labs’ 2025 report…
As organizations increasingly rely on SaaS applications to run their operations, securing them has become a necessity. Without strong protection, sensitive data, user access, and…
I was just reading a good post over at securosis by my friend Rich Mogull, and I have a few comments. He, and many others,…
Microsoft is testing a new Defender for Endpoint capability that will block traffic to and from undiscovered endpoints to thwart attackers’ lateral network movement attempts.…
The cybersecurity landscape today feels like a constant game of cat and mouse. Every time we think we’ve outpaced the attackers; they find new ways…