Category: CyberDefenseMagazine

How False Positive Rates Impact E-Commerce Conversion Rates: Balancing Security & UX
25
Oct
2023

How False Positive Rates Impact E-Commerce Conversion Rates: Balancing Security & UX

By Benjamin Fabre, CEO & Co-founder, DataDome In the world of e-commerce, ensuring the security of online transactions is crucial….

When it Comes to ZTNA, Buyer Beware
25
Oct
2023

When it Comes to ZTNA, Buyer Beware

By Denny LeCompete, CEO, Portnox With traditional perimeter-based defenses proving inadequate thanks to the rise of remote and hybrid work…

Closing The Gap: Resolving Human Error in Cloud Security
25
Oct
2023

Closing The Gap: Resolving Human Error in Cloud Security

By Patrick Pocalyko, GM North America, CYREBRO Cybersecurity technology is critical to securing the cloud but it’s easy to forget…

Tech-Forward Strategies to Effectively Fight Fraud
24
Oct
2023

Tech-Forward Strategies to Effectively Fight Fraud

By Blair Cohen, Founder and President, AuthenticID Not only has digital transformation completely reshaped the way we conduct business, but…

Why You Should Prioritize Your Privacy Policies
24
Oct
2023

Why You Should Prioritize Your Privacy Policies

By Jason M. Schwent, Senior Counsel, Clark Hill The enactment of the California Online Privacy Protection Act of 2003 created…

Steps for Preparing for a Quantum-Resistant Cryptographic Future
23
Oct
2023

Steps for Preparing for a Quantum-Resistant Cryptographic Future

By Timothy Hollebeek, Industry Technology Strategist, DigiCert The rise of post-quantum cryptography (PQC) is shedding light on the pervasive nature…

What is Malvertising?
23
Oct
2023

What is Malvertising? – Cyber Defense Magazine

Best practices for avoiding novel threats online By Tom McVey, Senior Sales Engineer EMEA, Menlo Security Artificial intelligence has transformed…

Secure Remote Access is Not a One Size Fits All Vision
22
Oct
2023

Secure Remote Access is Not a One Size Fits All Vision

Unlocking the puzzle of OT security By Kevin Kumpf, Cybersecurity Evangelist at Cyolo Secure Remote Access (SRA) is a term…

Lessons Learned: Cyberattack Shutters Five Illinois Healthcare Facilities
22
Oct
2023

Lessons Learned: Cyberattack Shutters Five Illinois Healthcare Facilities

Growing Cyber Attacks Pose Existential Threats to Business – Can More Connected And Efficient Security Help Organizations Gain The Upper…

ISO Certification is the Key to Better Cybersecurity for Business
21
Oct
2023

ISO Certification is the Key to Better Cybersecurity for Business

By Sami Mäkiniemelä, Chief Security Officer, Miradore Cyberattacks are on the rise. Every month it seems like another major business…

From Chaos to Control: The Crucial Role of Cyber Incident Response for SMBs
21
Oct
2023

From Chaos to Control: The Crucial Role of Cyber Incident Response for SMBs

How to create a well-defined incident response plan By David Chernitzky, Co-founder and CEO, Armour Cybersecurity Cybersecurity incidents can result…

Six Must-Focus Cybersecurity Areas in Network Sprawl
20
Oct
2023

Six Must-Focus Cybersecurity Areas in Network Sprawl

By Zachary Folk, Director of Solutions Engineering, Camelot Secure The anticipated benefits of 5G’s faster speed, lower latency, and greater…