Category: CyberDefenseMagazine

How 5G Networks Are Secured and Enabled By SASE
22
Jan
2023

How 5G Networks Are Secured and Enabled By SASE

By Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and…

The Rise in Cyber-Attacks from Bad International Actors
20
Jan
2023

The Rise in Cyber-Attacks from Bad International Actors

There has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems from…

We Need Quality Data Recovery in an Age ofIncreased Cyberattacks
20
Jan
2023

We Need Quality Data Recovery in an Age ofIncreased Cyberattacks

A comprehensive cybersecurity strategy involves data recovery now more than ever. A solid plan could save organizations from the most…

Doenerium: When Stealing from Thieves Is Also a Crime
18
Jan
2023

Doenerium: When Stealing from Thieves Is Also a Crime

By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat…

five-ways-to-keep-endpoint-protection-simple
18
Jan
2023

Five Ways to Keep Endpoint Protection Simple

By Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve….

5 Email Security Threats That Are a Cause For Concern
16
Jan
2023

5 Email Security Threats That Are a Cause For Concern

In the wake of sophisticated and expensive network security measures, protecting the lowly email server often gets missed. However, attackers…

DevSecOps and Digital Transformation
15
Jan
2023

DevSecOps and Digital Transformation: Bridging the Security Gap

How DevSecOps Ensure Security in Development Lifecycle? By Sudeep Srivastava, CEO, Appinventiv The Covid-19 pandemic has accelerated digital transformation to…

13
Jan
2023

Why Defensive Superiority Should Rein Over Offensive Capability

By Marcus Fowler, SVP of Strategic Engagements and Threats at Darktrace Amid a near-constant cycle of cyber incidents globally, organizations…

As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture
13
Jan
2023

As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture

By Jonathan Goldberger, SVP Security Practice, TPx The increasingly dangerous security landscape is particularly concerning to businesses, as they face…

Career Profile: Dr. Silke Holtmanns, PwC Finland
13
Jan
2023

Career Profile: Dr. Silke Holtmanns, PwC Finland

Name: Dr. Silke Holtmanns Affiliation: PwC Finland – 5G Security Team Can you briefly introduce your current role in cybersecurity?…

Applying the NIST Framework to Ransomware Risk Management
11
Jan
2023

Applying the NIST Framework to Ransomware Risk Management

Top Takeaways for Preparing for and Managing a Ransomware Attack with NISTIR 8374 By Gil Kirkpatrick, Microsoft MVP and Chief…

Compliance Is the Key to Unlocking Government Contractor Success
10
Jan
2023

Compliance Is the Key to Unlocking Government Contractor Success

By Dan Firrincili, Senior Manager, Product Marketing at Deltek In 2021, President Biden signed the Cybersecurity Executive Order 14028 into…