Category: CyberDefenseMagazine

Demystifying Cybersecurity Terms
10
Oct
2023

Demystifying Cybersecurity Terms – Cyber Defense Magazine

Vulnerability Assessments, Scanning, Penetration Testing, And Red Teaming By Dasha Deckwerth, President and CISO In the fast-growing field of cybersecurity,…

Is the rush to the fill the skills gap threatening technical competency?
09
Oct
2023

Is the rush to the fill the skills gap threatening technical competency?

There have been concerted efforts to encourage people to enter the cybersecurity profession. Back in February, the UK Cyber Security…

With Increased Cybersecurity Awareness, Why Does Phishing Still Work?
09
Oct
2023

With Increased Cybersecurity Awareness, Why Does Phishing Still Work?

By Zac Amos, Features Editor, ReHack With the costs of cyberattacks rising and the effects becoming more severe, many decision-makers…

Why Power Matters in Cyber Protection
08
Oct
2023

Why Power Matters in Cyber Protection

Defending power management equipment in an era of more connectivity By James Martin, Global Connectivity Product Manager, Eaton It’s well…

4 Reasons Why Not to Use Whatsapp for Secure Communications
07
Oct
2023

4 Reasons Why Not to Use Whatsapp for Secure Communications

By Nicole Allen, Senior Marketing Executive at Salt Communications Don’t settle for just using WhatsApp for secure communications. Check out…

How To Ensure Information Security of An Organization Basing on Business Requirements
07
Oct
2023

How To Ensure Information Security of An Organization Basing on Business Requirements

By Sergio Bertoni, The Leading Analyst at SearchInform There is a global trend of strengthening the legislation related to the…

The Basics of Digital Forensics
07
Oct
2023

The Basics of Digital Forensics

By Milica D. Djekic The digital forensics is a field that assists us to find the clues within a cyberspace…

The Power of Policy: The Best Weapon in Your Defensive Arsenal Isn’t New Tech
07
Oct
2023

The Power of Policy: The Best Weapon in Your Defensive Arsenal Isn’t New Tech

By Craig Burland,CISO of Inversion6 The default mental image of a 1970’s Ford Pinto shows a car ablaze with the…

Security in NaaS World - Cybersecurity Magazine
06
Oct
2023

PMRExpo 2023: Unveiling the Future of Secure Communications in Europe – 5G, Cybersecurity, and More in Focus!

PMRExpo 2023 – the leading European trade fair for Secure Communications will start in Cologne on 28 November. PMRExpo has been taking…

seeing-through-the-vendor-spin-interpreting-the-mitre-attck-evaluation-results
04
Oct
2023

Seeing Through the Vendor Spin: Interpreting the MITRE ATT&CK Evaluation Results

The 2023 MITRE ATT&CK Enterprise Evaluation results were just released and that means one thing – all participating vendors are…

The rising role of Digital Risk Monitoring solutions in M&A
03
Oct
2023

The rising role of Digital Risk Monitoring solutions in M&A

Venture Capital Firms and Acquiring Companies: The Blind Spot By Kaustubh Medhe, VP, Research & Threat Intelligence Mergers and Acquisitions…

Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks
02
Oct
2023

Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks

Abstract: Wireless mesh networks have recently presented a promising environment for many researchers to develop large-scale wireless communication. Traffic in…