Category: CyberDefenseMagazine

Print Friendly, PDF & Email
20
Feb
2025

Code Audit, Pentest and Bug Bounty – The Power of Three in Cybersecurity

Most of us are familiar with the phrase ‘less is more,’ but when it comes to cybersecurity, sometimes, more can…

The Mental Health Toll of Identity Theft
19
Feb
2025

The Mental Health Toll of Identity Theft

by Andrea Poteet-Bell, Editor Author Content Writer, Sunshine Behavioral Health Identity theft is constantly in the news. According to a…

Why should data privacy be a top priority for companies?
19
Feb
2025

Why Should Data Privacy be a Top Priority for Companies?

Understanding Data Privacy by Gergo Varga, Senior Content Manager, SEON Today, we are living in a world where data is…

Avoid The Cyber Scrooges and Porch Pirates
19
Feb
2025

Avoid The Cyber Scrooges and Porch Pirates

Authored by the Publisher of Cyber Security Magazine Deep fake videos and audios – including phone calls from cyber criminals,…

antenna
19
Feb
2025

Know Yourself, Know your Enemy: Diversity means Security

Covid-19 has created a new urgency for cyber security solutions in Asia By Nora Cao Director of Cyber Security &…

Cyber Security is Like Preventing Theft, Except the Thief is Already Inside Your House
19
Feb
2025

Preventing Insider Threat Training – Cyber Security Magazine

ONE STEP ON, TWO STEPS BACK By Milica D. Djekic The media will frequently report that some kind of the…

Is XDR The Right Solution for Today’s Security Threats?
19
Feb
2025

Is XDR The Right Solution for Today’s Security Threats?

Defining XDR’s Role in the Security Stack by Steve Garrison, VP Marketing, Stellar Cyber XDR and Open XR are two…

Cybersecurity Is Not a Technical Problem
19
Feb
2025

Cybersecurity Is Not a Technical Problem

IT IS A MINDSET PROBLEM By Felix Rosbach, VP Product Management, comforte AG Most cybersecurity vendors across the world would…

Security Breaches in the Metaverse
19
Feb
2025

Security Breaches in the Metaverse

Rob Cataldo, Managing Director, North America More and more brands are striving to embrace the metaverse. Gucci is creating its…

going beyond authentication
19
Feb
2025

Going Beyond Authentication – Cyber Security Magazine

User Authentication B2C by Kimberly Biddings, VP of Product, BIO-key International As companies look for multi-factor authentication (MFA) methods to…

How to Plan a Virtual Training Program?
19
Feb
2025

How to Plan a Virtual Training Program?

Virtual training is a type of training that allows employees to learn and train from a remote location. Employees can…

Print Friendly, PDF & Email
19
Feb
2025

Strengthening Financial Services with Third-Party Risk Mitigation Strategies

In a global economy that is becoming increasingly interconnected through various technologies, financial institutions rely on third-party companies for vital…