Category: CyberDefenseMagazine

Protecting Accounting Firms from Cyberattacks
28
May
2023

Protecting Accounting Firms from Cyberattacks

Cybersecurity Practices Must Be A Top Priority For Firms This Busy Season By Alan Hartwell, Chief Technology Officer at IRIS…

New Cyber Threats Calls for New Approaches
26
May
2023

New Cyber Threats Calls for New Approaches

By Mark Sincevich, Federal Director of Illumio Data compromises hit record numbers in 2021 with 1,826 occurrences reported, up 23…

An Integrated Approach Is Essential for Combating Insider Threats — Here’s Why
26
May
2023

An Integrated Approach Is Essential for Combating Insider Threats — Here’s Why

Insider threats are a growing phenomenon, but many businesses aren’t yet doing enough to protect themselves effectively. In Europe and…

Is Your Firm Ready for the SEC?
24
May
2023

Is Your Firm Ready for the SEC?

How To Prepare for the Regulations of Tomorrow By Jason Elmer, Founder and President of Drawbridge It is no secret…

How Must IT Leaders Develop Contingency Plans to Combat Geopolitical and Environmental Risks?
24
May
2023

How Must IT Leaders Develop Contingency Plans to Combat Geopolitical and Environmental Risks?

By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights In today’s geostrategic context, geopolitics and technology are inextricably linked,…

How the Increasing IT Talent Gap is Impacting the Cybersecurity Industry
24
May
2023

How the Increasing IT Talent Gap is Impacting the Cybersecurity Industry

By Pete Sorensen, VP of Strategic Initiatives of ConnectWise In the rapidly evolving digital landscape, technology solution providers (TSPs) are…

Stop Backing Up Ransomware
22
May
2023

Stop Backing Up Ransomware – Cyber Defense Magazine

By James Gorman, Cyber Security Expert and Entrepreneur When utilizing cloud technology for workloads, companies often assume that their current…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
22
May
2023

Analysis of Network Security Countermeasures From the Perspective of Improved FS Algorithm and ICT Convergence

Abstract: In this paper, the forward selection (FS) algorithm is introduced on the basis of information and communication technology, and…

Understanding The Concept of Privacy By Design
20
May
2023

Understanding The Concept of Privacy By Design

By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and…

The Data Challenge: How to Map Data in A Distributed World
20
May
2023

The Data Challenge: How to Map Data in A Distributed World

By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies Here’s a quick-fire question: do you know where…

Why aren't more businesses adopting security standards?
19
May
2023

Why aren’t more businesses adopting security standards?

Baselining your security by adopting a standard such as Cyber Essentials, Cyber Essentials Plus or the ISO 27001 standard can…

Cyberattacks on City and Municipal Governments
18
May
2023

Cyberattacks on City and Municipal Governments

Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago.  The increase…