Category: CyberDefenseMagazine

AI Can Bridge the Gap of Ineffective MDR Tools
14
Jun
2024

AI Can Bridge the Gap of Ineffective MDR Tools

By Orion Cassetto, Head of Marketing, Radiant Security Last year, nearly one-third of organizations suffered breaches, prompting security professionals to…

The “Non-Trend” of “Full Automation” Workflows in Cybersecurity: A Reality Check
13
Jun
2024

The “Non-Trend” of “Full Automation” Workflows in Cybersecurity: A Reality Check

By Oren Koren, CPO & Co-Founder of VERITI It’s no surprise that there’s been a shift to automated workflows in…

<strong>Cyber Risk Management Scorecard for US Courts</strong>
12
Jun
2024

Cyber Risk Management Scorecard for US Courts

Cybercriminals continue to attack enterprises and federal and state institutions by using sophisticated tools and adopting new breaching methods. Global…

A Closer Look at Recent Changes to New York State Department of Financial Services (NYSDFS) Cybersecurity Regulation
12
Jun
2024

A Closer Look at Recent Changes to New York State Department of Financial Services (NYSDFS) Cybersecurity Regulation

By Christopher Salone, Consulting Manager at FoxPointe Solutions Most changes to The New York State Department of Financial Services (NYSDFS)…

Applied Human Threat Management in Cyber Industry
12
Jun
2024

Applied Human Threat Management in Cyber Industry

By Milica D. Djekic The high-tech industry is an extremely emerging environment dealing with the sophisticated and skilled workforce that…

Cloud Control: Strategic Insights for Securing Your Digital Infrastructure
10
Jun
2024

Cloud Control: Strategic Insights for Securing Your Digital Infrastructure

By Joe Guerra, M.Ed, CASP+, Professor of Cybersecurity, Hallmark University When we talk about the cloud, it’s not just a…

Cybersecurity 101: Understanding the Basics of Online Protection
09
Jun
2024

Cybersecurity 101: Understanding the Basics of Online Protection

By Prem Khatri, Vice President of Operations for Chetu, Inc. In our more and more interconnected world, cybersecurity has turn…

Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter
08
Jun
2024

Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter

In the fast-moving age of artificial intelligence (AI), cybersecurity is more important than ever before. By Tyler Derr, Chief Technology…

Limits of Automation
07
Jun
2024

Limits of Automation – Cyber Defense Magazine

How Interactive Sandboxing Can Benefit Your Organization By Vlad Ananin, Technical Writer at Any.Run The current rate and complexity of…

Why Do Hackers Love Cryptocurrency?
06
Jun
2024

Why Do Hackers Love Cryptocurrency?

Cyber criminals and hackers love cryptocurrency because it’s off the books and is perfect for moving illegal payments and demanding…

Cryptographic Protocol Challenges
06
Jun
2024

Cryptographic Protocol Challenges – Cyber Defense Magazine

By Milica D. Djekic The communication protocol is an information exchange method where data are transferred only if two or…

Cybersecurity Concerns Facing the 2024 U.S. Elections
06
Jun
2024

Cybersecurity Concerns Facing the 2024 U.S. Elections

By Zac Amos, Features Editor, ReHack Cybersecurity oversights are making infrastructure in the U.S. the most fragile it has been…