Category: CyberDefenseMagazine

Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises
20
Nov
2023

Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises

By Walt Szablowski, Founder and Executive Chairman, Eracent Summary: With the increasing frequency and sophistication of cyberattacks in the digital…

How Google Play Store Security May Fail to Protect Users from Stealthy Malware
18
Nov
2023

How Google Play Store Security May Fail to Protect Users from Stealthy Malware

Incremental Malicious Update Attack (IMUTA) By Zia Muhammad and Zahid Anwar, Department of Computer Science, NDSU Android is the leading…

Institutionalizing Awareness to Stop Cyberattacks
18
Nov
2023

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology…

Rethinking SASE: Why Migrate Cybersecurity from Cloud to Browser
18
Nov
2023

Rethinking SASE: Why Migrate Cybersecurity from Cloud to Browser

By John “JP” Peterson, Chief Product Officer, High Wire Networks Cyberthreats are the scourge of our day. Few would argue,…

Building A Secure Integrated Collaboration Platform
16
Nov
2023

Building A Secure Integrated Collaboration Platform

By Allen Drennan, Principal & Co-Founder, Cordoniq Integrated collaboration platforms improve and enhance the experiences of hybrid and remote employees….

Spotlight: Whitepaper: Information security for the medical device industry
16
Nov
2023

Spotlight: Whitepaper: Information security for the medical device industry

With a focus on the medical device industry, this paper provides software developers, hardware developers, and manufacturers with an understanding…

Delivering Safe Browsing Experiences in A Rising Tide of Web-Based Threats
16
Nov
2023

Delivering Safe Browsing Experiences in A Rising Tide of Web-Based Threats

By Brett Raybould, EMEA Solutions Architect, Menlo Security  According to Google, the average worker now spends three-quarters of their working…

Publishers Spotlight: The Syndicate Group (TSG)
16
Nov
2023

Publishers Spotlight: The Syndicate Group (TSG)

The Syndicate Group (TSG) is a leading venture firm focused on revenue growth and new customer acquisition. Leveraging an ecosystem…

Securing the Future of Data Security Through Transparency: A Glimpse into Quantum Random Number Generators Research & Development
16
Nov
2023

Securing the Future of Data Security Through Transparency: A Glimpse into Quantum Random Number Generators Research & Development

By Denis Mandich, Co-Founder and Chief Technology Officer of Qrypt Software supply chain security is a major concern in today’s…

Anything Is Hackable: Consumers Must Not Be Caught Out
16
Nov
2023

Anything Is Hackable: Consumers Must Not Be Caught Out

In an age driven by data, cyber-related crimes are on the rise. Business leaders must invest in new strategies designed…

There Are Cyberheroes:  THE VIGILANCE MANIFESTO
16
Nov
2023

There Are Cyberheroes: THE VIGILANCE MANIFESTO

A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI…

16
Nov
2023

How Can We Turn a Hacker’s Toolkit Against Them? The Evolution of a Phishing Email

By Jack Chapman, VP of Threat Intelligence, Egress Hackers use many tools at each stage of an attack and with…