Category: CyberDefenseMagazine

Secure Remote Access is Not a One Size Fits All Vision
22
Oct
2023

Secure Remote Access is Not a One Size Fits All Vision

Unlocking the puzzle of OT security By Kevin Kumpf, Cybersecurity Evangelist at Cyolo Secure Remote Access (SRA) is a term…

Lessons Learned: Cyberattack Shutters Five Illinois Healthcare Facilities
22
Oct
2023

Lessons Learned: Cyberattack Shutters Five Illinois Healthcare Facilities

Growing Cyber Attacks Pose Existential Threats to Business – Can More Connected And Efficient Security Help Organizations Gain The Upper…

ISO Certification is the Key to Better Cybersecurity for Business
21
Oct
2023

ISO Certification is the Key to Better Cybersecurity for Business

By Sami Mäkiniemelä, Chief Security Officer, Miradore Cyberattacks are on the rise. Every month it seems like another major business…

From Chaos to Control: The Crucial Role of Cyber Incident Response for SMBs
21
Oct
2023

From Chaos to Control: The Crucial Role of Cyber Incident Response for SMBs

How to create a well-defined incident response plan By David Chernitzky, Co-founder and CEO, Armour Cybersecurity Cybersecurity incidents can result…

Six Must-Focus Cybersecurity Areas in Network Sprawl
20
Oct
2023

Six Must-Focus Cybersecurity Areas in Network Sprawl

By Zachary Folk, Director of Solutions Engineering, Camelot Secure The anticipated benefits of 5G’s faster speed, lower latency, and greater…

Meeting the highest standards of end-to-end encryption to defend your data
19
Oct
2023

Meeting the highest standards of end-to-end encryption to defend your data

Data is arguably an organisation’s biggest asset, which makes it a key target for cybercriminals. With 26 per cent of…

Securing Police Communications: Protecting Communities
19
Oct
2023

Securing Police Communications: Protecting Communities

By Nicole Allen, Senior Marketing Executive at Salt Communications Probably now more than ever, secure communications are crucial for Policing…

Key Factors and Measures to Address Burnout In The Cybersecurity Field
19
Oct
2023

Key Factors and Measures to Address Burnout In The Cybersecurity Field

The underlying threat to organizations By Kunal Purohit, Chief Digital Services Officer, Tech Mahindra In Today’s world Cyber-attacks may be…

Cybercrime, Cyber Warfare, and Government Attitudes Towards Cybersecurity
18
Oct
2023

Cybercrime, Cyber Warfare, and Government Attitudes Towards Cybersecurity

By Avishai Avivi, CISO, SafeBreach The face of cybersecurity is evolving. Cybercrime and its implications have grown into an inescapable…

Ensuring Container Security: Safeguarding the Future Of Cloud Computing
18
Oct
2023

Ensuring Container Security: Safeguarding the Future Of Cloud Computing

Containerization has revolutionized the world of software development. By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research…

Passive Optical Networks: A Game Changer for Now And The Future
17
Oct
2023

Passive Optical Networks: A Game Changer for Now And The Future

By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC…

Will Zero Trust Replace SD-WAN?
17
Oct
2023

Will Zero Trust Replace SD-WAN?

By Jaye Tillson, Director of Strategy, Axis Security A question I get asked frequently is, “Will zero trust replace SD-WAN?”….