Category: CyberDefenseMagazine

Ransomware Takes No Prisoners
30
May
2023

Ransomware Takes No Prisoners – Cyber Defense Magazine

By Monica Oravcova, COO and Co-Founder of Naoris Protocol The recent Killnet cyberattack that disrupted contact between NATO and military…

Reduce Healthcare Insider Threats with Identity and Access Management
30
May
2023

Reduce Healthcare Insider Threats with Identity and Access Management

By Zac Amos, Features Editor of ReHack Identity and access management (IAM) refers to the policies, procedures and technologies used…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
29
May
2023

Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange

Abstract: A tropical encryption scheme is analyzed in this paper, which uses double key exchange protocol (KEP). The key exchange…

Leadership Is Still Washing Their Hands of Cyber Risk
28
May
2023

Leadership Is Still Washing Their Hands of Cyber Risk

By John A. Smith, CEO of Conversant Group Where it comes to owning responsibility for cyber risk, executive leadership has…

Machine Identity Management: The Key to Managing Compliance Risk in a Multi-Cloud, Multi-Cluster World
28
May
2023

Machine Identity Management: The Key to Managing Compliance Risk in a Multi-Cloud, Multi-Cluster World

By Sitaram Iyer, Senior Director of Cloud Native Solutions at Venafi Financial services may be an industry in which mainframes…

Protecting Accounting Firms from Cyberattacks
28
May
2023

Protecting Accounting Firms from Cyberattacks

Cybersecurity Practices Must Be A Top Priority For Firms This Busy Season By Alan Hartwell, Chief Technology Officer at IRIS…

New Cyber Threats Calls for New Approaches
26
May
2023

New Cyber Threats Calls for New Approaches

By Mark Sincevich, Federal Director of Illumio Data compromises hit record numbers in 2021 with 1,826 occurrences reported, up 23…

An Integrated Approach Is Essential for Combating Insider Threats — Here’s Why
26
May
2023

An Integrated Approach Is Essential for Combating Insider Threats — Here’s Why

Insider threats are a growing phenomenon, but many businesses aren’t yet doing enough to protect themselves effectively. In Europe and…

Is Your Firm Ready for the SEC?
24
May
2023

Is Your Firm Ready for the SEC?

How To Prepare for the Regulations of Tomorrow By Jason Elmer, Founder and President of Drawbridge It is no secret…

How Must IT Leaders Develop Contingency Plans to Combat Geopolitical and Environmental Risks?
24
May
2023

How Must IT Leaders Develop Contingency Plans to Combat Geopolitical and Environmental Risks?

By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights In today’s geostrategic context, geopolitics and technology are inextricably linked,…

How the Increasing IT Talent Gap is Impacting the Cybersecurity Industry
24
May
2023

How the Increasing IT Talent Gap is Impacting the Cybersecurity Industry

By Pete Sorensen, VP of Strategic Initiatives of ConnectWise In the rapidly evolving digital landscape, technology solution providers (TSPs) are…

Stop Backing Up Ransomware
22
May
2023

Stop Backing Up Ransomware – Cyber Defense Magazine

By James Gorman, Cyber Security Expert and Entrepreneur When utilizing cloud technology for workloads, companies often assume that their current…