Category: CyberDefenseMagazine

Additional Detection of Clones Using Locally Sensitive Hashing
06
Aug
2023

Additional Detection of Clones Using Locally Sensitive Hashing

Abstract: Today, there are many methods for detecting blocks with repetitions and redundancy in the program code. But mostly they…

Why Cybersecurity Provision is Critical for Businesses, Large and Small
04
Aug
2023

Why Cybersecurity Provision is Critical for Businesses, Large and Small

By Astrid Gobardhan, Group Data Protection Officer at VFS Global, the world’s largest outsourcing and technology services specialist Against a…

Bad Hygiene: New Study Uncovers Common Security Failures of Cloud-First Organizations
04
Aug
2023

Bad Hygiene: New Study Uncovers Common Security Failures of Cloud-First Organizations

By Ruoting Sun, Vice President of Products, Secureframe The rapid rise of cloud-first organizations has revolutionized the way businesses operate….

HEAT Attacks Vs Apts – What Is the Difference?
04
Aug
2023

HEAT Attacks Vs Apts – What Is the Difference?

By Mark Guntrip, Senior Director of Cybersecurity Strategy, Menlo Security A new breed of attacker has emerged, one that has…

7 Benefits of Implementing ZTNA
02
Aug
2023

7 Benefits of Implementing ZTNA

(Zero Trust Network Access) By Howie Robleza, Freelance Writer, Avigilon One of the most significant worries for business leaders in…

Biometric as a Service (BaaS) – An Opinion Piece
02
Aug
2023

Biometric as a Service (BaaS) – An Opinion Piece

By Mohit Shrivastava, Chief Analyst ICT, Future Market Insights Biometric as a service (BaaS) works best as a striking alternative…

Why Inadequate Investment in Cybersecurity is a False Economy
31
Jul
2023

Why Inadequate Investment in Cybersecurity is a False Economy

By Luke Dash, CEO, ISMS.online Already suffering the most cyberattacks than any other European country [RH1], the UK looks set…

The Power of AI In Today’s Rapidly Evolving Financial Crime Landscape
31
Jul
2023

The Power of AI In Today’s Rapidly Evolving Financial Crime Landscape

By Pedro Barata, Chief Product Officer, Feedzai Fraud has plagued the financial services sector for years. In today’s rapidly evolving…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
31
Jul
2023

Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems

Abstract: When creating signature-based cybersecurity systems for network intrusion detection (NIDS), spam filtering, protection against viruses, worms, etc., developers have…

What Can We Learn by Analyzing 197 Years of Cumulative Cybersecurity Testing?
29
Jul
2023

What Can We Learn by Analyzing 197 Years of Cumulative Cybersecurity Testing?

By Carolyn Crandall, Chief Security Advocate, Cymulate Each year, Cymulate releases a Cybersecurity Effectiveness Report that summarizes and analyzes the…

Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023
29
Jul
2023

Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023

By Sanjay Raja, VP of Product, Gurucul Dwell time, or the length of time a cyber attacker remains hidden within…

The Brick Wall of Identity Security: Five Parts for A Rock-Solid Defense
27
Jul
2023

The Brick Wall of Identity Security: Five Parts for A Rock-Solid Defense

By Raj Gopalakrishna, Co-Founder and Chief Product Architect, Acalvio Technologies The use of stolen credentials and resulting identity compromises have…