Category: CyberDefenseMagazine

Why a Picture Is Worth a Thousand Files
09
Jan
2023

Why a Picture Is Worth a Thousand Files

The world is a visual place. Communication with photos and short videos has now become commonplace thanks to applications like…

Cyber Threats Driving Insurance Claims Activity
09
Jan
2023

Cyber Threats Driving Insurance Claims Activity

By Scott Sayce, Global Head of Cyber and Group Head of the Cyber Centre of Competence at Allianz Global Corporate…

Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?
09
Jan
2023

Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?

By Geoffrey Lottenberg Imagine a swarm of termites secretly and incessantly feeding on your home. In relative silence, your home…

Automated Patch Management Can Protect Your Business from A Data Disaster
07
Jan
2023

Automated Patch Management Can Protect Your Business from A Data Disaster

By Sami Mäkiniemelä, Chief Security Officer, Miradore It’s easy to identify security needs from physical threats we can see. For…

Common Vulnerabilities of Enterprise Web Security That Demands Your Attention
07
Jan
2023

Common Vulnerabilities of Enterprise Web Security That Demands Your Attention

By Eden Allen, Cyber Security Educator, CheapSSLWeb Years ago, the way leading enterprise-level concerns were viewed differed from how it…

Applying UX Design To Cybersecurity
06
Jan
2023

Applying UX Design To Cybersecurity

If there’s one thing businesses should always focus on, it’s user experience (UX). If users aren’t having a good experience…

5 Ways to Protect Your Workplace from Cybersecurity Threats
05
Jan
2023

5 Ways to Protect Your Workplace from Cybersecurity Threats

By Nicole Allen, Senior Marketing Executive, Salt Communications. The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving the ability…

What is a mobile possession factor – and how can it replace passwords to stop phishing?
05
Jan
2023

What is a mobile possession factor – and how can it replace passwords to stop phishing?

By Paul McGuire, Co-Founder and CEO of tru.ID We all use email, and we all use passwords – which means…

AI is the answer to modern cybersecurity threats
05
Jan
2023

AI Is the Answer To Modern Cybersecurity Threats

Why embracing AI solutions is key to combatting evolving cyber threats across many sectors. By Ralph Chammah, CEO, OwlGaze With…

Why Seeing Your Network Through a Hacker’s Eyes Helps Defend It
03
Jan
2023

Why Seeing Your Network Through a Hacker’s Eyes Helps Defend It

By Nick Merritt, Vice President of Security Products and Services, Halo Security Business leaders are confronted with headlines every day…

Zero Trust is More Than a Buzzword
03
Jan
2023

Zero Trust is More Than a Buzzword

Five Steps to Data-Centric Zero Trust Architecture That Works By Terry Ray, SVP Data Security GTM, Field CTO and Imperva…

Data, Privacy, And the Future of Artificial Intelligence
03
Jan
2023

Data, Privacy, And the Future of Artificial Intelligence

By Michael G. McLaughlin, Associate, Baker, Donelson, Bearman, Caldwell & Berkowitz, PC Data privacy and protection have become both central…