Category: CyberDefenseMagazine

National Cyber Security Vulnerabilities in The Changing Security Environment
24
Nov
2023

National Cyber Security Vulnerabilities in The Changing Security Environment

Implications For the Resilience of The NATO Cyber and Information Space By Georgi Atanasov, Subject Matter Expert in Bulgarian ministry…

IPv6 Security – Part 3
23
Nov
2023

Data Loss Prevention Metrics: Measuring the Effectiveness of Your DLP Program

Data Loss Prevention (DLP) programs have emerged as a crucial component of an organization’s cybersecurity strategy. However, implementing a DLP…

Visibility Isn’t Enough; It’s What You Do with It That Counts
22
Nov
2023

Visibility Isn’t Enough; It’s What You Do with It That Counts

By Christina Richmond, Chief Strategy and Growth Officer, Inspira Enterprise As cyber risks continue to grow and evolve (here’s looking…

4 Key Security Challenges to Address with Confidential Computing
22
Nov
2023

4 Key Security Challenges to Address with Confidential Computing

Confidential Computing delivers a variety of security benefits and helps deliver a platform for controlled, compliant activation of sensitive data…

Four Years and a Pandemic Later: Have Agencies Become Cloud Smart?
20
Nov
2023

Four Years and a Pandemic Later: Have Agencies Become Cloud Smart?

By James Langley, Master Solutions Consultant, Hitachi Vantara Federal June 2023 marked the four-year anniversary of the release of the…

Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises
20
Nov
2023

Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises

By Walt Szablowski, Founder and Executive Chairman, Eracent Summary: With the increasing frequency and sophistication of cyberattacks in the digital…

How Google Play Store Security May Fail to Protect Users from Stealthy Malware
18
Nov
2023

How Google Play Store Security May Fail to Protect Users from Stealthy Malware

Incremental Malicious Update Attack (IMUTA) By Zia Muhammad and Zahid Anwar, Department of Computer Science, NDSU Android is the leading…

Institutionalizing Awareness to Stop Cyberattacks
18
Nov
2023

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology…

Rethinking SASE: Why Migrate Cybersecurity from Cloud to Browser
18
Nov
2023

Rethinking SASE: Why Migrate Cybersecurity from Cloud to Browser

By John “JP” Peterson, Chief Product Officer, High Wire Networks Cyberthreats are the scourge of our day. Few would argue,…

Building A Secure Integrated Collaboration Platform
16
Nov
2023

Building A Secure Integrated Collaboration Platform

By Allen Drennan, Principal & Co-Founder, Cordoniq Integrated collaboration platforms improve and enhance the experiences of hybrid and remote employees….

Spotlight: Whitepaper: Information security for the medical device industry
16
Nov
2023

Spotlight: Whitepaper: Information security for the medical device industry

With a focus on the medical device industry, this paper provides software developers, hardware developers, and manufacturers with an understanding…

Delivering Safe Browsing Experiences in A Rising Tide of Web-Based Threats
16
Nov
2023

Delivering Safe Browsing Experiences in A Rising Tide of Web-Based Threats

By Brett Raybould, EMEA Solutions Architect, Menlo Security  According to Google, the average worker now spends three-quarters of their working…