Category: CyberDefenseMagazine

Making Our Infrastructure Resilient: 5 Priorities for Security R&D
29
Mar
2024

Making Our Infrastructure Resilient: 5 Priorities for Security R&D

By Saurabh Amin, Professor of Civil and Environmental Engineering PI, Laboratory for Information and Decision Systems Massachusetts Institute of Technology…

Key Differences in Securing OT & IT Environments
28
Mar
2024

Key Differences in Securing OT & IT Environments

Critical cybersecurity components every security leader must know amid the convergence of IT & OT By Joe O’Donnell, EVP of…

Institutionalizing Awareness to Stop Cyberattacks
28
Mar
2024

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology…

Implementing ZTA: Benefits and Best Practices
27
Mar
2024

Implementing ZTA: Benefits and Best Practices

By Eric Sugar, President, ProServeIT In an era defined by the relentless advance of digitalization and the ever-expanding interconnectivity of…

Attackers Keep Evolving: Lessons from Expel’s Q2 2023 Quarterly Threat Report
27
Mar
2024

Attackers Keep Evolving: Lessons from Expel’s Q2 2023 Quarterly Threat Report

Cyberdefenders plug the holes, so attackers innovate to try to stay ahead. By Aaron Walton, Threat Intel Analyst, Expel Most…

What are the Essential Skills for Cyber Security Professionals in 2024?
26
Mar
2024

What are the Essential Skills for Cyber Security Professionals in 2024?

Where should you invest time and resources to drive success when it comes to the must-have skills and tools for…

Enhancing The Nation’s Cybersecurity Workforce
26
Mar
2024

Enhancing The Nation’s Cybersecurity Workforce

Supporting Critical Infrastructure Resilience with Skill-Based Labor By Randall Sandone, Executive Director, Critical Infrastructure Resilience Institute at The Grainger College…

Cybersecurity Awareness Month: The Overlooked Importance of API Security
26
Mar
2024

Cryptographic Solutions for Data Security in Cloud Computing

A Run Time Trend-based Comparison of NCS, ERSA, and EHS Abstract: Due to the recent explosion in the amount of…

Does Zero Trust Improve Productivity?
25
Mar
2024

Does Zero Trust Improve Productivity?

By Zac Amos, Features Editor, ReHack Zero trust has gained significant attention as an effective approach to secure digital assets….

Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy
25
Mar
2024

Why Digital Trust Has Become More Critical Than Cybersecurity & Privacy

WHY DIGITAL TRUST MATTERS By Lalit Ahluwahli, CEO & Founder, DigitalXForce & iTrustXForce We all know that cybersecurity and privacy…

Cybersecurity Threats in Global Satellite Internet
25
Mar
2024

Cybersecurity Threats in Global Satellite Internet

By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology Internet via satellite was first used for military purposes in the…

Classic Information Security Management Errors
24
Mar
2024

Classic Information Security Management Errors

How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as…