Category: CyberDefenseMagazine

01
Dec
2023

How to Avoid Common Security Incidents in the Public Cloud

By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the…

An Integrated Approach Is Essential for Combating Insider Threats — Here’s Why
30
Nov
2023

Why Harness the Full Potential of Zero-Trust Architecture to Secure OT Environments?

Zero-trust architecture is becoming popular because it is a more comprehensive cybersecurity framework than previous castle-and-moat models. Increasing internal threat…

From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies
30
Nov
2023

From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies

By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security…

4 Unexpected Ways AI Bias Can Jeopardize Cybersecurity
29
Nov
2023

ETSI Security Conference 2023: Dr. Claire Vishik and the Future of Cybersecurity

ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, took place face-to-face from 16 to 19 October 2023, in ETSI, Sophia Antipolis, France, and gathered more…

E-mail Compromise
29
Nov
2023

E-mail Compromise

How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of…

28
Nov
2023

IP network security in the age of DDoS and quantum computing

By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to…

Earthquakes, Cyber Breaches, and Mitigating Disasters through Design
28
Nov
2023

Earthquakes, Cyber Breaches, and Mitigating Disasters through Design

By Archie Agarwal, Founder and CEO of ThreatModeler The Great Earthquake of San Francisco in 1906 caused unbelievable levels of…

Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market
28
Nov
2023

Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market

The health IT security market is experiencing remarkable growth, driven by the pressing need for robust solutions that protect patient…

Fearful Festivities: How to stay cyber safe this festive season
27
Nov
2023

Fearful Festivities: How to stay cyber safe this festive season

With Christmas Day being mere weeks away, jingle bells and debit cards will be tapping and tinkling for this year’s Black Friday sales. While online shopping offers…

Post-Quantum Cryptography: Safeguarding the Digital Future and Bolstering Security in Critical Sectors
26
Nov
2023

Post-Quantum Cryptography: Safeguarding the Digital Future and Bolstering Security in Critical Sectors

By Maila Zahra, Air University Islamabad and Zia Muhammad, North Dakota State University Post-quantum cryptography aims to develop secure cryptographic…

With Americans Traveling More Than Ever Before, It’s Time Businesses Increase Their Mobile Security Efforts
26
Nov
2023

With Americans Traveling More Than Ever Before, It’s Time Businesses Increase Their Mobile Security Efforts

If your colleagues are working from the road, follow these five steps to strengthen your mobile cybersecurity initiatives. By George…

Guarding Against the Insider Threat: Do Your Employees Pose the Greatest Risk?
24
Nov
2023

Guarding Against the Insider Threat: Do Your Employees Pose the Greatest Risk?

By Moty Kanias, VP of Cyber Strategy & Alliances, NanoLock Security Great businesses understand that their people are their most…