Category: CyberDefenseMagazine

8 Tips for Best Results in Red-Teaming
27
Oct
2023

8 Tips for Best Results in Red-Teaming

By Zac Amos, Features Editor, ReHack In cybersecurity, a red team exercise is a unique way to ensure businesses can…

Why Compliance Matters When Dealing with AI and Finances
26
Oct
2023

Why Compliance Matters When Dealing with AI and Finances

By Saeid Hejazi, Founder, Wally Artificial intelligence has skyrocketed in popularity in recent months, particularly as the widespread availability and…

Effective Workplace Education is Built Around Incentives
26
Oct
2023

Effective Workplace Education is Built Around Incentives

How Companies Can Personalize Cybersecurity Awareness Training By Asaf Kotsel, CEO, Dcoya The key to a successful workplace education platform…

How Cyber Risk Quantification can Help Align CISOs with the Board.
26
Oct
2023

How Cyber Risk Quantification can Help Align CISOs with the Board.

By Lior Bar-Lev, VP Strategy & BizOps, CYE Recently, the American National Institute for Standards and Technology (NIST) released a…

Stronger Together: Attack Surface Management and Security Validation
26
Oct
2023

Stronger Together: Attack Surface Management and Security Validation

By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as…

How False Positive Rates Impact E-Commerce Conversion Rates: Balancing Security & UX
25
Oct
2023

How False Positive Rates Impact E-Commerce Conversion Rates: Balancing Security & UX

By Benjamin Fabre, CEO & Co-founder, DataDome In the world of e-commerce, ensuring the security of online transactions is crucial….

When it Comes to ZTNA, Buyer Beware
25
Oct
2023

When it Comes to ZTNA, Buyer Beware

By Denny LeCompete, CEO, Portnox With traditional perimeter-based defenses proving inadequate thanks to the rise of remote and hybrid work…

Closing The Gap: Resolving Human Error in Cloud Security
25
Oct
2023

Closing The Gap: Resolving Human Error in Cloud Security

By Patrick Pocalyko, GM North America, CYREBRO Cybersecurity technology is critical to securing the cloud but it’s easy to forget…

Tech-Forward Strategies to Effectively Fight Fraud
24
Oct
2023

Tech-Forward Strategies to Effectively Fight Fraud

By Blair Cohen, Founder and President, AuthenticID Not only has digital transformation completely reshaped the way we conduct business, but…

Why You Should Prioritize Your Privacy Policies
24
Oct
2023

Why You Should Prioritize Your Privacy Policies

By Jason M. Schwent, Senior Counsel, Clark Hill The enactment of the California Online Privacy Protection Act of 2003 created…

Steps for Preparing for a Quantum-Resistant Cryptographic Future
23
Oct
2023

Steps for Preparing for a Quantum-Resistant Cryptographic Future

By Timothy Hollebeek, Industry Technology Strategist, DigiCert The rise of post-quantum cryptography (PQC) is shedding light on the pervasive nature…

What is Malvertising?
23
Oct
2023

What is Malvertising? – Cyber Defense Magazine

Best practices for avoiding novel threats online By Tom McVey, Senior Sales Engineer EMEA, Menlo Security Artificial intelligence has transformed…