Category: CyberDefenseMagazine

Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model
01
Sep
2023

Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model

Arctic Wolf is a global leader in security operations, enabling customers to manage their cyber risk in the face of…

Security in NaaS World - Cybersecurity Magazine
28
Aug
2023

Security in NaaS World – Cybersecurity Magazine

Introduction There is ever increase in security breaches resulting in serious business implications despite the proliferation and sophistication of security…

4 Unexpected Ways AI Bias Can Jeopardize Cybersecurity
28
Aug
2023

4 Unexpected Ways AI Bias Can Jeopardize Cybersecurity

Bias in artificial intelligence (AI) is one of the technology’s most prominent issues. Stories of AI repeating and even exaggerating…

Our Risk Perception Is Broken How Do We Fix It?
28
Aug
2023

Our Risk Perception Is Broken How Do We Fix It?

By Miguel Clarke, GRC and Cybersecurity Lead at Armor and former FBI Special Agent I was first introduced to the…

SaaS Application Security: Why It Matters and How to Get It Right
28
Aug
2023

SaaS Application Security: Why It Matters and How to Get It Right

Protecting Emerging Startups from Advanced Cyber Threats with Proactive Security Measures By Babar Khan Akhunzada, Founder, SecurityWall Startups are known…

Publisher’s Spotlight:  Cigent: Make Your Data Invisible
28
Aug
2023

Publisher’s Spotlight: Cigent: Make Your Data Invisible

Cigent Technologies is a data security company that is renowned for their data protection  capabilities. They’ve had a long-standing relationship…

Publisher’s Spotlight: Mitiga: The Next Generation of Cloud Incident Response
28
Aug
2023

Publisher’s Spotlight: Mitiga: The Next Generation of Cloud Incident Response

Cloud and SaaS have become the new nexus for today’s cyber attackers.  Are you ready to respond to a breach? …

A Cloud Security Conundrum: Protecting Your Company from Third-Party Software Supply Chain Gaps
28
Aug
2023

A Cloud Security Conundrum: Protecting Your Company from Third-Party Software Supply Chain Gaps

By Vrinda Khurjekar, Senior Director, AMER business, Searce The sky is the limit for cloud migration as Gartner predicts that…

The Billion Dollar Problem: Securing Business Communication in the Financial Sector
28
Aug
2023

The Billion Dollar Problem: Securing Business Communication in the Financial Sector

By Anurag Lal, President and CEO of NetSfere Securing business communication in the financial services industry is now more than…

The Industrial Control Systems and The Internet of Things
28
Aug
2023

The Industrial Control Systems and The Internet of Things

By Milica D. Djekic The industrial control systems (ICS) are usually the part of critical infrastructure to every country or…

Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries
24
Aug
2023

Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries

Oligo Security is one of the leading open source cybersecurity platforms, pioneering the next wave of application security with a…

Protecting Sensitive Information Within Translation
24
Aug
2023

Protecting Sensitive Information Within Translation

Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO of Tomedes When it comes to translation,…