Category: CyberDefenseMagazine

From Passwords to Passkeys – A Passing of the Torch
16
Aug
2023

From Passwords to Passkeys – A Passing of the Torch

The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those…

Ensuring Trust in Military Network Automation: Addressing Layer 8 Issues for Improved Operations and Security
14
Aug
2023

Ensuring Trust in Military Network Automation: Addressing Layer 8 Issues for Improved Operations and Security

By Marc Packler, President, CISO Advisory, Silent Quadrant and Tony Thomas, President & Chairman, Tony Thomas & Associates LLC Automation…

Embedding Privacy-First Behaviors for Future Generations
14
Aug
2023

Embedding Privacy-First Behaviors for Future Generations

By Michael Levit, Co-Founder and CEO of Tempest As all of our lives have moved online, the collection and sharing…

It's Time to Rethink MFA
13
Aug
2023

It’s Time to Rethink MFA

The UK government has launched new, stricter cyber security measures designed inresponse to the growth of ransomware attacks. These measures have been…

Don’t Jump to Conclusions on Zero Trust Adoption
12
Aug
2023

Don’t Jump to Conclusions on Zero Trust Adoption

By John Linford, Forum Director, The Open Group Security Forum, and Open Trusted Technology Forum The Open Group Security &…

Changing the Status Quo of Cloud Security
10
Aug
2023

Changing the Status Quo of Cloud Security

Skyhigh Security’s The Data Dilemma report underscores major paradigm shifts in cloud adoption and risk. By Rodman Ramezanian, Global Cloud…

How the SEC’s Proposed Security Rules Could Impact Businesses
10
Aug
2023

How the SEC’s Proposed Security Rules Could Impact Businesses

By Portia Cole, Emergent Threat Researcher, Avertium If the Security and Exchange Commission (SEC) has its way, it will soon…

Controlling Cybersecurity Risks
10
Aug
2023

Controlling Cybersecurity Risks – Cyber Defense Magazine

Controlling Cyber Risks and Fraud by Risk Assessment By Hakan Kantas, Senior IT Director We are trying to protect all…

What Will Cybersecurity Jobs Look Like in 2028?
10
Aug
2023

What Will Cybersecurity Jobs Look Like in 2028?

By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies What Will Cybersecurity Jobs Look Like in 2028? Macroeconomic…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
07
Aug
2023

System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security

Abstract: The complication of technological processes due to the modernization of complex technological processes aggregates with a distributed spatial infrastructure…

One Defense Against Data Breaches: Don’t Have the Data to Begin With
06
Aug
2023

One Defense Against Data Breaches: Don’t Have the Data to Begin With

By Raj Ananthanpillai, Founder and CEO, Trua When it comes to hackers stealing Social Security numbers and other personal identifiable…

Heard At RSAC 2023 – Protecting the Protectors
06
Aug
2023

Heard At RSAC 2023 – Protecting the Protectors

Some Personal Risks to Individual Cybersecurity Practitioners Are Elevated Because Of The Work They Do. Is It Time for Workplace…