Category: CyberDefenseMagazine

5 Benefits Of SIEM To The Cybersecurity Of Any Business
21
Jun
2023

5 Benefits Of SIEM To The Cybersecurity Of Any Business

By Aaron Haynes, a Columnist at Loganix.com Cybersecurity is a top priority for many businesses today because of the significant…

Going On the Defensive: Turning the Tide on The Cybersecurity Vulnerabilities Of Smart Home Devices With Value-Added Services
20
Jun
2023

Going On the Defensive: Turning the Tide on The Cybersecurity Vulnerabilities Of Smart Home Devices With Value-Added Services

By Craig Thole, SVP, Product Development and Operations at Assurant, Inc. While the rise of internet-enabled smart home devices generates…

Communicating Cyber Risk
20
Jun
2023

Communicating Cyber Risk – Cyber Defense Magazine

CISOs struggle with the board amidst an economic downturn. By Tim Fleming, Strategic Advisor, Silverfort Cyber risk is now nailed…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
20
Jun
2023

Scraping and Analyzing Data of a Large Darknet Marketplace

Abstract: Darknet marketplaces in the Tor network are popular places to anonymously buy and sell various kinds of illegal goods….

ChatGPT: The Next Wave of Innovation or Your Biggest Security Threat?
19
Jun
2023

ChatGPT: The Next Wave of Innovation or Your Biggest Security Threat?

By Craig Burland, CISO, Inversion6 ChatGPT, an artificial intelligence language model developed by OpenAI, is in the midst of the…

Is ChatGPT Ready to Disrupt Cybersecurity?
19
Jun
2023

Is ChatGPT Ready to Disrupt Cybersecurity?

By Anurag Gurtu, Co-Founder & CPO, StrikeReady We’ve seen so many advancements in artificial intelligence within just a few years….

Preparing Travel and Hospitality Companies for Cybersecurity in The Wake Of Travel Technologies
16
Jun
2023

Preparing Travel and Hospitality Companies for Cybersecurity in The Wake Of Travel Technologies

By Shambhu Nath Jha, Associate Vice President, Fact.MR Technology has touched every aspect of our lives and became an integral…

Cyber Risk Quantification: A New Way to Understand Security Risks
14
Jun
2023

Cyber Risk Quantification: A New Way to Understand Security Risks

CRQ can identify security improvements, prioritize implementation and justify security investments. Here’s how to make it work for your organization….

Evolution of the CISO Role
14
Jun
2023

Evolution of the CISO Role

By Jaye Tillson, Director of Strategy, Axis Security Evolution of the CISO Role The Chief Information Security Officer (CISO) role…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
12
Jun
2023

Image Hashing Robust Against Cropping and Rotation

Abstract: Image recognition is an important mechanism used in various scenarios. In the context of multimedia forensics, its most significant…

The Growing Necessity of Emphasizing Cloud Security in Business Operations
11
Jun
2023

The Growing Necessity of Emphasizing Cloud Security in Business Operations

Ensuring the protection and reliability of cloud security for business success By Deepak Gupta,CTO & Co-Founder of LoginRadius In today’s…

Third-Party Cyber Security Risk Management: Best Practices
11
Jun
2023

Third-Party Cyber Security Risk Management: Best Practices

By Sananda Dasgupta, Tech Industry and Cybersecurity Writer at Coloco Businesses are becoming increasingly reliant on third-party services for their…