Category: CyberDefenseMagazine

Why cybersecurity needs to be part of ESG
02
Nov
2023

How Reinforcement Learning Bolsters Cybersecurity Defenses Against Advanced Threats

Cybersecurity is all about protecting digital assets from unauthorized access and attacks. In today’s digital age, safeguarding sensitive information is…

LoRaWAN Security - Cybersecurity Magazine
31
Oct
2023

The Battle Royale between RBAC vs ABAC vs PBAC

At the start of the millennium, cybersecurity was significantly less complex. Recent working practices now demand complex data in huge amounts, ready to share across organisations and across…

Increase in Phishing Threats among Organizations Has Created a Lot of Opportunities for the Cyber Security Industry
31
Oct
2023

Increase in Phishing Threats among Organizations Has Created a Lot of Opportunities for the Cyber Security Industry

By Koyal Ghosh, Senior Writer, Allied Market Reasearch Growing trend of BYOD and smart assimilation of machine learning, IoT, and…

4 Secure Framework Considerations Before Deploying Workloads in The Public Cloud
30
Oct
2023

4 Secure Framework Considerations Before Deploying Workloads in The Public Cloud

By Jhilam Biswas, Customer Engineering Manager, Google Cloud Enterprises are adopting public cloud providers like never before. Gartner estimated the…

Fend Off the Next Phishing Attack With A “Human Firewall.”
29
Oct
2023

Fend Off the Next Phishing Attack With A “Human Firewall.”

Implement the ‘Mindset – Skillset – Toolset’ triad By Dr. Yvonne Bernard, CTO, Hornetsecurity Spear phishing continues to be the…

Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy in A Data-Centric World
28
Oct
2023

Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy in A Data-Centric World

By Ani Chaudhuri, CEO, Dasera The EU-US Data Privacy Framework is a product of years of painstaking negotiation, a well-intended…

Why cybersecurity needs to be part of ESG
27
Oct
2023

Why cybersecurity needs to be part of ESG

ESG (Environmental, Social, and Governance) policies tend to be viewed as being predominantly concerned with climate change and the social…

8 Tips for Best Results in Red-Teaming
27
Oct
2023

8 Tips for Best Results in Red-Teaming

By Zac Amos, Features Editor, ReHack In cybersecurity, a red team exercise is a unique way to ensure businesses can…

Why Compliance Matters When Dealing with AI and Finances
26
Oct
2023

Why Compliance Matters When Dealing with AI and Finances

By Saeid Hejazi, Founder, Wally Artificial intelligence has skyrocketed in popularity in recent months, particularly as the widespread availability and…

Effective Workplace Education is Built Around Incentives
26
Oct
2023

Effective Workplace Education is Built Around Incentives

How Companies Can Personalize Cybersecurity Awareness Training By Asaf Kotsel, CEO, Dcoya The key to a successful workplace education platform…

How Cyber Risk Quantification can Help Align CISOs with the Board.
26
Oct
2023

How Cyber Risk Quantification can Help Align CISOs with the Board.

By Lior Bar-Lev, VP Strategy & BizOps, CYE Recently, the American National Institute for Standards and Technology (NIST) released a…

Stronger Together: Attack Surface Management and Security Validation
26
Oct
2023

Stronger Together: Attack Surface Management and Security Validation

By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as…