Category: CyberDefenseMagazine

Securing Communications for Operational Military Success
21
Jul
2023

Securing Communications for Operational Military Success

By Nicole Allen, Senior Marketing Executive at Salt Communications. The significance in having Secure Communications for Military Operations. Thanks to…

Oh, Great and Powerful Cloud, I Wish to Be Free Of The Burdens Of Infrastructure!
19
Jul
2023

Oh, Great and Powerful Cloud, I Wish to Be Free Of The Burdens Of Infrastructure!

By Craig Burland, CISO, Inversion6 The Cloud’s booming voice, stunning light show and smoke fill the room.  “Faster! More agile!…

Securing Digital Nasional Berhad (DNB) 5G Network Infrastructure
19
Jul
2023

Securing Digital Nasional Berhad (DNB) 5G Network Infrastructure

Overview Unlike 4G, 5G goes beyond purely voice and faster data speed for consumer. Instead, 5G is also a major…

How Should CMMC Impact Your Remote Work Policies?
17
Jul
2023

How Should CMMC Impact Your Remote Work Policies?

By Zac Amos, Features Editor, ReHack Cybersecurity Maturity Model Certification (CMMC) is another compliance framework defense industrial base (DIB) contractors…

How Professional Human Hackers Choose Their Targets
17
Jul
2023

How Professional Human Hackers Choose Their Targets

By Peter Warmka, Founder, Counterintelligence Institute Over the past few years, Cybersecurity professionals have acknowledged the increasing need of security…

How Sandboxes Protect Organizations from Malware — Known And Unknown
15
Jul
2023

How Sandboxes Protect Organizations from Malware — Known And Unknown

From Detecting Threats to Collecting Rich Signature Data — Sandboxes Help Malware Researchers Keep Defense Systems In Sync With An…

Hacks And Data Leaks
15
Jul
2023

Hacks And Data Leaks – Cyber Defense Magazine

How to protect businesses from cyberattacks By Sergey Ozhegov, CEO, SearchInform Hacks and data leaks: how to protect businesses from…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
14
Jul
2023

Method of Increasing the Security of Smart Parking System

Abstract: Currently, the urgent task is developing the methods and tools for increasing Smart Parking software system security. The purpose…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
14
Jul
2023

Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime

Abstract: Wireless Sensor Network (WSN) is a group of small, intelligent sensors with limited resources. WSN has limited energy restrictions,…

An Interview with Greg Van Der Gaast
13
Jul
2023

An Interview with Greg Van Der Gaast

By Megan Lupton, Senior Content Executive, Champions Speakers From one of the most wanted hackers to being featured in the…

What are NIST Encryption Standards? Why Do They Matter a Lot?
13
Jul
2023

What are NIST Encryption Standards? Why Do They Matter a Lot?

By Amar Basic, Co-Founder CyberArrow Data encryption is essential in today’s technologically advanced world to safeguard sensitive information against hacker…

Empowered Encryption
11
Jul
2023

Empowered Encryption – Cyber Defense Magazine

Why organizations must take back control of their data By Dimitri Nemirovsky, Co-Founder & COO, Atakama Sometimes, what a change…