Category: CyberDefenseMagazine
Abstract: The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties…
By Ben Smith, Field Chief Technology Officer, NetWitness Vulnerability is a four-letter word in the world of cybersecurity, as one…
Organizational Data Security Strategy – Bring Your Own Key (Byok) By Chris Allen, Senior Solutions Architect, Cryptomathic. Cloud computing is…
By Milica D. Djekic The Internet of Things (IoT) represents a collection of devices being capable to talk to each…
By Carolyn Duby, Chief Technology Officer, Cloudera Government Solutions The federal government has placed a stronger emphasis on zero trust…
By Sean Malone, Chief Information Security Officer, Demandbase Technology has given rise to many comparisons in the past few years,…
By Gizem Yılmaz, Product Owner, Nextray AI In the modern digital era, the significance of cyber security has escalated. With…
By Craig Burland, CISO, Inversion6 Planning your next move to reinforce the organization’s cyber security posture? Take a moment to…
By Mohit Shrivastava, ICT Chief Analyst, Future Market Insights Bots have incorporated themselves into our online experiences in the ever-expanding…
Each year, the cybersecurity industry anticipates a handful of landmark research that informs the market regarding benchmarking best practices, understanding…
October marks the commencement of Cybersecurity Awareness Month, a global initiative aimed at fostering a safer digital landscape. As we…
Navigating a New Wave of Cyber Threats By Ashley Manraj, Chief Technology Officer, Pvotal Technologies Recent advances in Artificial Intelligence…











