Category: CyberDefenseMagazine

Hybrid Mesh Firewall Management
20
Aug
2023

Hybrid Mesh Firewall Management – Cyber Defense Magazine

By Ulrica de Fort-Menares, VP of Product & Strategy, Indeni What is Hybrid Mesh Firewall? With the rise of hybrid…

How We Grew Revenue by Strengthening Cybersecurity
18
Aug
2023

How We Grew Revenue by Strengthening Cybersecurity

Make your security strategy good for business. By David Weisong, CIO at Energy Solutions Utility companies are, like just about…

Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection
18
Aug
2023

Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection

Did you know that only 4% of CISOs have real-time visibility into runtime vulnerabilities in containerized production environments (https://www.dynatrace.com/news/blog/runtime-vulnerability-management-still-vexing-organizations/)?  According…

Five Tips to Securing Your Organization Through Your People.
16
Aug
2023

Five Tips to Securing Your Organization Through Your People.

By Dr. Inka Karppinen, CPsychol. Lead Behavioural Scientist, CybSafe While many commentators continue to tout technological solutions to various cyber…

From Samsung to the Pentagon – Recent Stories Remind Us About the Importance of Sensitive Data Guardrails
16
Aug
2023

From Samsung to the Pentagon – Recent Stories Remind Us About the Importance of Sensitive Data Guardrails

By Thomas Segura, Cyber Security Expert, GitGuardian The last few weeks have been very challenging for data protection experts. In…

From Passwords to Passkeys – A Passing of the Torch
16
Aug
2023

From Passwords to Passkeys – A Passing of the Torch

The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those…

Ensuring Trust in Military Network Automation: Addressing Layer 8 Issues for Improved Operations and Security
14
Aug
2023

Ensuring Trust in Military Network Automation: Addressing Layer 8 Issues for Improved Operations and Security

By Marc Packler, President, CISO Advisory, Silent Quadrant and Tony Thomas, President & Chairman, Tony Thomas & Associates LLC Automation…

Embedding Privacy-First Behaviors for Future Generations
14
Aug
2023

Embedding Privacy-First Behaviors for Future Generations

By Michael Levit, Co-Founder and CEO of Tempest As all of our lives have moved online, the collection and sharing…

It's Time to Rethink MFA
13
Aug
2023

It’s Time to Rethink MFA

The UK government has launched new, stricter cyber security measures designed inresponse to the growth of ransomware attacks. These measures have been…

Don’t Jump to Conclusions on Zero Trust Adoption
12
Aug
2023

Don’t Jump to Conclusions on Zero Trust Adoption

By John Linford, Forum Director, The Open Group Security Forum, and Open Trusted Technology Forum The Open Group Security &…

Changing the Status Quo of Cloud Security
10
Aug
2023

Changing the Status Quo of Cloud Security

Skyhigh Security’s The Data Dilemma report underscores major paradigm shifts in cloud adoption and risk. By Rodman Ramezanian, Global Cloud…

How the SEC’s Proposed Security Rules Could Impact Businesses
10
Aug
2023

How the SEC’s Proposed Security Rules Could Impact Businesses

By Portia Cole, Emergent Threat Researcher, Avertium If the Security and Exchange Commission (SEC) has its way, it will soon…