Category: CyberDefenseMagazine

Print Friendly, PDF & Email
11
Sep
2025

AI Agents: The Next Big Cybersecurity Challenge w/ Frank Teruel

AI agents are creating powerful new opportunities for both businesses and everyday users — from smarter customer experiences to increased…

11
Sep
2025

AI Agents: The Next Big Cybersecurity Challenge w/ Frank Teruel

AI agents are creating powerful new opportunities for both businesses and everyday users — from smarter customer experiences to increased…

More Than Sales… How Brokers Can Play a Critical Role in Strengthening the USA’s National Cybersecurity
10
Sep
2025

More Than Sales… How Brokers Can Play a Critical Role in Strengthening the USA’s National Cybersecurity

As cyber threats continue to rise, enterprises can rely on unexpected allies for support: their insurance brokers. Brokers are not…

Using Artificial Intelligence for Strengthening Email Security
10
Sep
2025

Using Artificial Intelligence for Strengthening Email Security

Today, email-based attacks are increasingly sophisticated, however artificial intelligence (AI) can offer vital defense. With AI use, organizations can counteract…

Print Friendly, PDF & Email
10
Sep
2025

IEC 62443: A Cybersecurity Guide for Industrial Systems (Part 3)

Welcome back to the series on the IEC 62443 standard for industrial cybersecurity. This third installment will investigate the documents…

Innovator Spotlight: Oleria
10
Sep
2025

Innovator Spotlight: Oleria – Cyber Defense Magazine

Identity’s New Frontier: How CISOs Can Navigate the Complex Landscape of Modern Access Management The cybersecurity battlefield has shifted. No…

Innovator Spotlight: Straiker
09
Sep
2025

Innovator Spotlight: Straiker – Cyber Defense Magazine

The AI Security Frontier: Protecting Tomorrow’s Digital Landscape Cybersecurity leaders are facing an unprecedented challenge. As artificial intelligence transforms how…

Innovator Spotlight: Xcape
09
Sep
2025

Innovator Spotlight: Xcape – Cyber Defense Magazine

Continuous Vulnerability Management: The New Cybersecurity Imperative Security leaders are drowning in data but starving for actionable insights. Traditional penetration…

Innovator Spotlight: Corelight
09
Sep
2025

Innovator Spotlight: Corelight – Cyber Defense Magazine

The Network’s Hidden Battlefield: Rethinking Cybersecurity Defense Modern cyber threats are no longer knocking at the perimeter – they’re already…

Exploring Key Technology Trends for 2024
09
Sep
2025

Exploring Key Technology Trends for 2024

Fast forward to today, and the importance of staying current with the latest tech trends can’t be overstated – it’s…

Software Supply Chain Attacks
09
Sep
2025

Software Supply Chain Attacks – Cyber Defense Magazine

In today’s rapidly evolving business landscape, software supply chain attacks are becoming increasingly common—and more sophisticated. The XZ backdoor attack,…

Innovator Spotlight: Seraphic
09
Sep
2025

Innovator Spotlight: Seraphic – Cyber Defense Magazine

Reinventing Browser Security for the Enterprise The Browser: Enterprise’s Biggest Blind Spot On any given day, the humble web browser…