Category: CyberDefenseMagazine

How Continuous Authentication Is Changing the Game for BYOD And Contracted Employees
29
Sep
2023

How Continuous Authentication Is Changing the Game for BYOD And Contracted Employees

By Jasson Casey, Chief Technology Officer, Beyond Identity Five years ago, utilizing your personal device for work was considered a…

Gartner’s Calling for a Human-Centric Approach to Cybersecurity – Here’s How to Implement It
29
Sep
2023

Gartner’s Calling for a Human-Centric Approach to Cybersecurity – Here’s How to Implement It

By Roy Zur, CEO, ThriveDX Enterprise Gartner, earlier this year, published a report stating that the future of cybersecurity lies…

Why IT Governance and Mitigating Risk is a Critical Part of Cyber Defense
29
Sep
2023

Why IT Governance and Mitigating Risk is a Critical Part of Cyber Defense

Organizations must recognize how every solution they implement works together and as part of their larger defense-in-depth strategy. By Vincent…

Overcoming Challenges in Cyber Defense Business Naming in The Age of AI
29
Sep
2023

Overcoming Challenges in Cyber Defense Business Naming in The Age of AI

Actionable Naming Strategies for Founders By Darpan Munjal, CEO and Founder, Squadhelp.com Establishing a strong brand identity is key to…

Let’s Ease Up on the Cyber Criminal High Tech Hype
29
Sep
2023

Let’s Ease Up on the Cyber Criminal High Tech Hype

A recent article in Bleeping Computer detailed a new cyber attack technique developed by researchers in the UK that uses…

Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot
27
Sep
2023

Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through…

Defending Beyond 9-to-5: BlackCloak
26
Sep
2023

Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’ Digital Sanctuaries

by Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine Overwhelming would be an understatement while walking through the 2023 BlackHat USA’s…

Why cyber risk is one of the top critical risks facing organisations today – and why it’s growing
25
Sep
2023

A Multi-Path Approach to Protect DNS Against DDoS Attacks

Abstract: Domain Name System (DNS) is considered a vital service for the internet and network operations, and practically this service is…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
25
Sep
2023

A Multi-Path Approach to Protect DNS Against DDoS Attacks

Abstract: Domain Name System (DNS) is considered a vital service for the internet and networks operations, and practically this service…

Six Tips to Ensure a Strong Patch Management Strategy
24
Sep
2023

Six Tips to Ensure a Strong Patch Management Strategy

By Ashley Leonard, CEO and Founder, Syxsense The proliferation of software applications and updates across the market today has put…

Cyber Attacks on Municipalities
23
Sep
2023

Cyber Attacks on Municipalities – Cyber Defense Magazine

What attracts cyber criminals to municipalities and how they can be prevented. By Veronika (Nikki) Jack, Student Majoring in Information…

Criminals are Bypassing Authentication with Stolen Session Cookies
23
Sep
2023

Criminals are Bypassing Authentication with Stolen Session Cookies

By Trevor Hilligoss, Director of Security Research, SpyCloud The last 12 months revealed a concerning trend in credential exposure. According…