Category: CyberDefenseMagazine
By Walt Szablowski, Founder and Executive Chairman, Eracent Summary: With the increasing frequency and sophistication of cyberattacks in the digital…
Incremental Malicious Update Attack (IMUTA) By Zia Muhammad and Zahid Anwar, Department of Computer Science, NDSU Android is the leading…
By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology…
By John “JP” Peterson, Chief Product Officer, High Wire Networks Cyberthreats are the scourge of our day. Few would argue,…
By Allen Drennan, Principal & Co-Founder, Cordoniq Integrated collaboration platforms improve and enhance the experiences of hybrid and remote employees….
With a focus on the medical device industry, this paper provides software developers, hardware developers, and manufacturers with an understanding…
By Brett Raybould, EMEA Solutions Architect, Menlo Security According to Google, the average worker now spends three-quarters of their working…
The Syndicate Group (TSG) is a leading venture firm focused on revenue growth and new customer acquisition. Leveraging an ecosystem…
By Denis Mandich, Co-Founder and Chief Technology Officer of Qrypt Software supply chain security is a major concern in today’s…
In an age driven by data, cyber-related crimes are on the rise. Business leaders must invest in new strategies designed…
A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI…
By Jack Chapman, VP of Threat Intelligence, Egress Hackers use many tools at each stage of an attack and with…











