Category: CyberDefenseMagazine
The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those…
By Marc Packler, President, CISO Advisory, Silent Quadrant and Tony Thomas, President & Chairman, Tony Thomas & Associates LLC Automation…
By Michael Levit, Co-Founder and CEO of Tempest As all of our lives have moved online, the collection and sharing…
The UK government has launched new, stricter cyber security measures designed inresponse to the growth of ransomware attacks. These measures have been…
By John Linford, Forum Director, The Open Group Security Forum, and Open Trusted Technology Forum The Open Group Security &…
Skyhigh Security’s The Data Dilemma report underscores major paradigm shifts in cloud adoption and risk. By Rodman Ramezanian, Global Cloud…
By Portia Cole, Emergent Threat Researcher, Avertium If the Security and Exchange Commission (SEC) has its way, it will soon…
Controlling Cyber Risks and Fraud by Risk Assessment By Hakan Kantas, Senior IT Director We are trying to protect all…
By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies What Will Cybersecurity Jobs Look Like in 2028? Macroeconomic…
Abstract: The complication of technological processes due to the modernization of complex technological processes aggregates with a distributed spatial infrastructure…
By Raj Ananthanpillai, Founder and CEO, Trua When it comes to hackers stealing Social Security numbers and other personal identifiable…
Some Personal Risks to Individual Cybersecurity Practitioners Are Elevated Because Of The Work They Do. Is It Time for Workplace…











