Category: CyberDefenseMagazine

LoRaWAN Security - Cybersecurity Magazine
17
Oct
2023

LoRaWAN Security – Cybersecurity Magazine

Abstract: The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties…

MOVEit’s Ransomware Attack Highlights the State of Cybersecurity
16
Oct
2023

MOVEit’s Ransomware Attack Highlights the State of Cybersecurity

By Ben Smith, Field Chief Technology Officer, NetWitness Vulnerability is a four-letter word in the world of cybersecurity, as one…

Securing the Cloud
16
Oct
2023

Securing the Cloud – Cyber Defense Magazine

Organizational Data Security Strategy – Bring Your Own Key (Byok) By Chris Allen, Senior Solutions Architect, Cryptomathic. Cloud computing is…

How Hacking of The Internet of Things Works In Practice
15
Oct
2023

How Hacking of The Internet of Things Works In Practice

By Milica D. Djekic The Internet of Things (IoT) represents a collection of devices being capable to talk to each…

Achieving Optimal Zero Trust Maturity: The Role of Data and Governance
15
Oct
2023

Achieving Optimal Zero Trust Maturity: The Role of Data and Governance

By Carolyn Duby, Chief Technology Officer, Cloudera Government Solutions The federal government has placed a stronger emphasis on zero trust…

Implementing a Modern, Holistic Approach to Tech Sector Security
14
Oct
2023

Implementing a Modern, Holistic Approach to Tech Sector Security

By Sean Malone, Chief Information Security Officer, Demandbase Technology has given rise to many comparisons in the past few years,…

Transformative Benefits of ML&AI in Cybersecurity
14
Oct
2023

Transformative Benefits of ML&AI in Cybersecurity

By Gizem Yılmaz, Product Owner, Nextray AI In the modern digital era, the significance of cyber security has escalated. With…

Policy: The Silent Sentinel of Your Cybersecurity Defenses
14
Oct
2023

Policy: The Silent Sentinel of Your Cybersecurity Defenses

By Craig Burland, CISO, Inversion6 Planning your next move to reinforce the organization’s cyber security posture? Take a moment to…

Bot Security: The Hunt for Vulnerabilities In The Digital Realm And The Burgeoning Need To Safeguard Users, Businesses, And Global Economies
14
Oct
2023

Bot Security: The Hunt for Vulnerabilities In The Digital Realm And The Burgeoning Need To Safeguard Users, Businesses, And Global Economies

By Mohit Shrivastava, ICT Chief Analyst, Future Market Insights Bots have incorporated themselves into our online experiences in the ever-expanding…

Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem
13
Oct
2023

Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem

Each year, the cybersecurity industry anticipates a handful of landmark research that informs the market regarding benchmarking best practices, understanding…

Cybersecurity Awareness Month: The Overlooked Importance of API Security
13
Oct
2023

Cybersecurity Awareness Month: The Overlooked Importance of API Security

October marks the commencement of Cybersecurity Awareness Month, a global initiative aimed at fostering a safer digital landscape. As we…

Unmasking the AI Flip
10
Oct
2023

Unmasking the AI Flip – Cyber Defense Magazine

Navigating a New Wave of Cyber Threats By Ashley Manraj, Chief Technology Officer, Pvotal Technologies Recent advances in Artificial Intelligence…