Category: CyberDefenseMagazine

Why It Will Take Sophisticated AI Solutions to Fight AI Security Attacks
11
Jun
2023

Why It Will Take Sophisticated AI Solutions to Fight AI Security Attacks

By Rom Hendler, CEO and Co-Founder of Trustifi We live in amazing times, when advanced AI-based text generating engines like…

1020 Cyber Security Professionals’ Actions and Experiences When Applying for A New Role.
11
Jun
2023

1020 Cyber Security Professionals’ Actions and Experiences When Applying for A New Role.

By Torquil Macleod, Founder and Director of Via Resource At Via Resource, we strive to provide a supportive service to…

Closing The Cyber Marketing Gap with Investors
11
Jun
2023

Closing The Cyber Marketing Gap with Investors

Positioning security as a stakeholder value proposition By Patrick Kehoe, Chief Marketing Officer at Coalfire With breaches and shutdowns making…

IPv6 Security features – Part 1
09
Jun
2023

IPv6 Security features – Part 1

This is the first article in a 3-part series, looking into the various security features that are part of the…

Stopping Criminals from Profiting Off Malware Requires a New Approach
07
Jun
2023

Stopping Criminals from Profiting Off Malware Requires a New Approach

By CW Walker, Director, Security Product Strategy at SpyCloud The first three quarters of 2022 saw the total detection of…

The Data Dilemma: Balancing Business Growth and Security
07
Jun
2023

The Data Dilemma: Balancing Business Growth and Security

By Noah Johnson, Co-Founder & CTO of Dasera In today’s digital age, data is the lifeblood of business growth. With…

Top 7 Tips to Protect Your Endpoint Devices
05
Jun
2023

Top 7 Tips to Protect Your Endpoint Devices

By Nicole Allen, Senior Marketing Executive at Salt Communications The threat landscape has become more sophisticated due to the new…

Considering All Returns on a Cybersecurity Compliance Program
05
Jun
2023

Considering All Returns on a Cybersecurity Compliance Program

By Doug Barbin, Chief Growth Officer and Managing Principal at Schellman C-Suite executives have many variables to consider when they…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
05
Jun
2023

A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations

Abstract: In the last two decades, the number of rapidly increasing cyber incidents (i.e., data theft and privacy breaches) shows…

Secure Enterprise Collaboration Tools Are Critical in Light of Remote Work and Cyber-Attacks.
05
Jun
2023

Secure Enterprise Collaboration Tools Are Critical in Light of Remote Work and Cyber-Attacks.

By Allen Drennan, Principal and Co-Founder of Cordoniq Cyberattacks escalated in 2022 as critical industries remain a frequent target of…

Risk: Everything Everywhere All at Once
03
Jun
2023

Risk: Everything Everywhere All at Once

It’s Time to Get Proactive About Risk Reduction By Marc Gaffan, CEO of IONIX The first quarter of 2023 is…

Video: Journal of Cyber Security and Mobility Best Paper 2022 with Roman Yampolskiy
02
Jun
2023

Video: Journal of Cyber Security and Mobility Best Paper 2022 with Roman Yampolskiy

River Publishers has announced the best paper of 2022 for the Journal of Cyber Security and Mobility, which was awarded…