Category: CyberDefenseMagazine

Triple Tactics
23
Sep
2023

Triple Tactics – Cyber Defense Magazine

How APIs are being Targeted with Trinity Attacks By Andy Mills, VP EMEA, Cequence Security Application Programming Interfaces (APIs) are…

Three Ways to Protect the Data Powering Summer Vacations
23
Sep
2023

Three Ways to Protect the Data Powering Summer Vacations

By Amit Shaked, CEO and Co-Founder, Laminar The travel industry is in the midst of rapid recovery following the COVID-19…

Island Hopping in the Supply Chain – A Paradise for Cybercriminals
22
Sep
2023

Island Hopping in the Supply Chain – A Paradise for Cybercriminals

Cybercriminals are notoriously good at the art of uncovering the paths of least resistance that lead to an organisation’s valuable…

Publishers Spotlight: Nisos:  Your Managed Intelligence Partner
21
Sep
2023

Publishers Spotlight: Nisos: Your Managed Intelligence Partner

Nisos is the Managed Intelligence™ team you need to consider working with to solve your most complex security challenges. They…

How to interpret the 2023 MITRE ATT&CK Evaluation results
20
Sep
2023

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization….

Publishers Spotlight: Omdia Research Risk-based Vulnerability Management Findings
19
Sep
2023

Publishers Spotlight: Omdia Research Risk-based Vulnerability Management Findings

Omdia research finds risk-based vulnerability management set to encompass the vulnerability management market by 2027 The first comparative research into…

Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs
19
Sep
2023

Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs

CyTwist has launched its Preemptive Cyber Attack Management Platform (PCAM) to enable defenders to expose attacks early and accurately while…

What to Consider When Choosing Cybersecurity Insurance Coverage
19
Sep
2023

What to Consider When Choosing Cybersecurity Insurance Coverage

By Richard Clarke, Chief Insurance Officer, Colonial Surety Company Despite the fact that marquee corporate names like Meta, T-Mobile, and…

TikTok Ban: The Death Knell for Free Access to the Web?
19
Sep
2023

TikTok Ban: The Death Knell for Free Access to the Web?

By Sebastian Schaub, CEO, hide.me Chinese tech company TikTok is firmly in the headlights as authorities in the US continue…

How Ai Can Be Used as A Tool to Help Monitor for Cybercrimes and Keep Kids Safe From Cyberbullying And Scams
19
Sep
2023

How Ai Can Be Used as A Tool to Help Monitor for Cybercrimes and Keep Kids Safe From Cyberbullying And Scams

By Ron Kerbs, CEO of Kidas Machine learning (ML) and classifiers have been used as cybersecurity tools for years. Starting…

Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection
18
Sep
2023

Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection

Dataminr delivers the earliest warnings on high impact events, emerging risks, threats, and other critical information far in advance of…

Analyzing Four Diverse Attack Techniques Used by XeGroup
18
Sep
2023

Analyzing Four Diverse Attack Techniques Used by XeGroup

By Brett Raybould – EMEA Solutions Architect, Menlo Security XeGroup is a prime example of the untold damage that sophisticated…