Category: CyberDefenseMagazine

The Power of AI In Today’s Rapidly Evolving Financial Crime Landscape
31
Jul
2023

The Power of AI In Today’s Rapidly Evolving Financial Crime Landscape

By Pedro Barata, Chief Product Officer, Feedzai Fraud has plagued the financial services sector for years. In today’s rapidly evolving…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
31
Jul
2023

Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems

Abstract: When creating signature-based cybersecurity systems for network intrusion detection (NIDS), spam filtering, protection against viruses, worms, etc., developers have…

What Can We Learn by Analyzing 197 Years of Cumulative Cybersecurity Testing?
29
Jul
2023

What Can We Learn by Analyzing 197 Years of Cumulative Cybersecurity Testing?

By Carolyn Crandall, Chief Security Advocate, Cymulate Each year, Cymulate releases a Cybersecurity Effectiveness Report that summarizes and analyzes the…

Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023
29
Jul
2023

Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023

By Sanjay Raja, VP of Product, Gurucul Dwell time, or the length of time a cyber attacker remains hidden within…

The Brick Wall of Identity Security: Five Parts for A Rock-Solid Defense
27
Jul
2023

The Brick Wall of Identity Security: Five Parts for A Rock-Solid Defense

By Raj Gopalakrishna, Co-Founder and Chief Product Architect, Acalvio Technologies The use of stolen credentials and resulting identity compromises have…

The Next Evolution of Devsecops For The Defense Department
27
Jul
2023

The Next Evolution of Devsecops For The Defense Department

By Jonas Lazo, Vice President of Digital Engineering, Sev1Tech The White House recently proposed an $842 billion budget for the…

Why Should Everyone in Your Workplace Know About Cybersecurity?
25
Jul
2023

Why Should Everyone in Your Workplace Know About Cybersecurity?

The Importance Of Strengthening Your Organization’s Human Firewall By Involving All Business Levels And Functional Areas. By Sara Velásquez, Growth…

An Interview with Sarah Armstrong-Smith
25
Jul
2023

An Interview with Sarah Armstrong-Smith

By Megan Lupton, Senior Content Executive, Champions Speakers Sarah Armstrong-Smith is a globally revered voice in the cyberspace. She is…

Three Things Corporate Board Members Need to Know to Protect Their Companies From Cyberattacks
23
Jul
2023

Three Things Corporate Board Members Need to Know to Protect Their Companies From Cyberattacks

By Sami Mäkiniemelä, Chief Security Officer, Miradore Last year, the U.S. saw a 57% increase in the number of cyberattacks…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
22
Jul
2023

On the Use of the Kolmogorov–Wiener Filter for Heavy-tail Process Prediction

Abstract: This paper is devoted to the investigation of the applicability of the Kolmogorov–Wiener filter to the prediction of heavy-tail…

Operationalizing Zero Trust Architecture
21
Jul
2023

Operationalizing Zero Trust Architecture – Cyber Defense Magazine

By Chaim Mazal, Chief Security Officer, Gigamon Over the last few years, organizations have been hearing about a Zero Trust…

Phishing Kit: New Frontier of Hacker Attacks within Everyone’s Reach
21
Jul
2023

Phishing Kit: New Frontier of Hacker Attacks within Everyone’s Reach

By Lorenzo Asuni, CMO, Ermes Cyber Security The Phishing phenomenon is growing exponentially, and unlike the most common forms of…