Category: CyberDefenseMagazine

Healthcare Under Siege
07
Jul
2023

Healthcare Under Siege – Cyber Defense Magazine

The Critical Threat of Cloud and IoMT Vulnerabilities By Ty Greenhalgh, Industry Principal, Healthcare, Claroty The healthcare sector is grappling…

Before You Deploy Advanced Tech, Consider the Hidden Cyberthreats
07
Jul
2023

Before You Deploy Advanced Tech, Consider the Hidden Cyberthreats

By Jennifer Varner, Director Security Solutions Sales – North America, Verizon Business Every year, emerging technologies come to market, offering…

From AI-driven Defense to Dark Web Threat Intelligence
07
Jul
2023

From AI-driven Defense to Dark Web Threat Intelligence

How RSA Conference’s Cybersecurity Innovators are Advancing Defense-in-Depth By Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine The world of cybersecurity…

Deception Technology Can Derail Cyber Attackers
04
Jul
2023

Deception Technology Can Derail Cyber Attackers

By Brett James, Director, Transformation Strategy at Zscaler In recent years, federal agencies have expanded remote work dramatically, and in…

Innovation or Threat?
04
Jul
2023

Innovation or Threat? – Cyber Defense Magazine

ChatGPT increases the risk of cyberattacks. By Markus Cserna, CTO, cyan Digital Security The whole world looks with amazement and…

Protecting Sensitive Information Within Translation
04
Jul
2023

Protecting Sensitive Information Within Translation

Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO, Tomedes When it comes to translation, it’s…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
03
Jul
2023

Blockchain-Based Medical Decision Support System

Abstract: An urgent task at this moment is the use of blockchain technology to ensure the security of medical decision…

10 Tips for Better Data Security During Cloud Migration
30
Jun
2023

10 Tips for Better Data Security During Cloud Migration

Migrating data to the cloud comes with many unique security considerations. The process itself can result in data loss or…

How Secure Communication Can Enhance Your Organization’s Cyber Defence
29
Jun
2023

How Secure Communication Can Enhance Your Organization’s Cyber Defence

By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due…

The 2023 State of Ransomware: A Resurgence Is Brewing
29
Jun
2023

The 2023 State of Ransomware: A Resurgence Is Brewing

By Bob Maley, CSO at Black Kite After last year’s good fight against ransomware gangs, CISOs thought they won. Overall…

Do Highly Intelligent Language Models Pose a Cyber Threat?
28
Jun
2023

Do Highly Intelligent Language Models Pose a Cyber Threat?

By Brett Raybould, EMEA Solutions Architect, Menlo Security It is estimated that as many as 100 million users have engaged…

Now is the Time for the Thoughtful Regulation of Crypto
28
Jun
2023

Now is the Time for the Thoughtful Regulation of Crypto

By Hugh Brooks, Director of Security Operations, CertiK The rapid expansion of the cryptocurrency industry has brought technological innovation and…