Category: CyberDefenseMagazine

The Next Evolution of Devsecops For The Defense Department
27
Jul
2023

The Next Evolution of Devsecops For The Defense Department

By Jonas Lazo, Vice President of Digital Engineering, Sev1Tech The White House recently proposed an $842 billion budget for the…

Why Should Everyone in Your Workplace Know About Cybersecurity?
25
Jul
2023

Why Should Everyone in Your Workplace Know About Cybersecurity?

The Importance Of Strengthening Your Organization’s Human Firewall By Involving All Business Levels And Functional Areas. By Sara Velásquez, Growth…

An Interview with Sarah Armstrong-Smith
25
Jul
2023

An Interview with Sarah Armstrong-Smith

By Megan Lupton, Senior Content Executive, Champions Speakers Sarah Armstrong-Smith is a globally revered voice in the cyberspace. She is…

Three Things Corporate Board Members Need to Know to Protect Their Companies From Cyberattacks
23
Jul
2023

Three Things Corporate Board Members Need to Know to Protect Their Companies From Cyberattacks

By Sami Mäkiniemelä, Chief Security Officer, Miradore Last year, the U.S. saw a 57% increase in the number of cyberattacks…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
22
Jul
2023

On the Use of the Kolmogorov–Wiener Filter for Heavy-tail Process Prediction

Abstract: This paper is devoted to the investigation of the applicability of the Kolmogorov–Wiener filter to the prediction of heavy-tail…

Operationalizing Zero Trust Architecture
21
Jul
2023

Operationalizing Zero Trust Architecture – Cyber Defense Magazine

By Chaim Mazal, Chief Security Officer, Gigamon Over the last few years, organizations have been hearing about a Zero Trust…

Phishing Kit: New Frontier of Hacker Attacks within Everyone’s Reach
21
Jul
2023

Phishing Kit: New Frontier of Hacker Attacks within Everyone’s Reach

By Lorenzo Asuni, CMO, Ermes Cyber Security The Phishing phenomenon is growing exponentially, and unlike the most common forms of…

Securing Communications for Operational Military Success
21
Jul
2023

Securing Communications for Operational Military Success

By Nicole Allen, Senior Marketing Executive at Salt Communications. The significance in having Secure Communications for Military Operations. Thanks to…

Oh, Great and Powerful Cloud, I Wish to Be Free Of The Burdens Of Infrastructure!
19
Jul
2023

Oh, Great and Powerful Cloud, I Wish to Be Free Of The Burdens Of Infrastructure!

By Craig Burland, CISO, Inversion6 The Cloud’s booming voice, stunning light show and smoke fill the room.  “Faster! More agile!…

Securing Digital Nasional Berhad (DNB) 5G Network Infrastructure
19
Jul
2023

Securing Digital Nasional Berhad (DNB) 5G Network Infrastructure

Overview Unlike 4G, 5G goes beyond purely voice and faster data speed for consumer. Instead, 5G is also a major…

How Should CMMC Impact Your Remote Work Policies?
17
Jul
2023

How Should CMMC Impact Your Remote Work Policies?

By Zac Amos, Features Editor, ReHack Cybersecurity Maturity Model Certification (CMMC) is another compliance framework defense industrial base (DIB) contractors…

How Professional Human Hackers Choose Their Targets
17
Jul
2023

How Professional Human Hackers Choose Their Targets

By Peter Warmka, Founder, Counterintelligence Institute Over the past few years, Cybersecurity professionals have acknowledged the increasing need of security…