Category: CyberDefenseMagazine

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
22
May
2023

Analysis of Network Security Countermeasures From the Perspective of Improved FS Algorithm and ICT Convergence

Abstract: In this paper, the forward selection (FS) algorithm is introduced on the basis of information and communication technology, and…

Understanding The Concept of Privacy By Design
20
May
2023

Understanding The Concept of Privacy By Design

By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and…

The Data Challenge: How to Map Data in A Distributed World
20
May
2023

The Data Challenge: How to Map Data in A Distributed World

By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies Here’s a quick-fire question: do you know where…

Why aren't more businesses adopting security standards?
19
May
2023

Why aren’t more businesses adopting security standards?

Baselining your security by adopting a standard such as Cyber Essentials, Cyber Essentials Plus or the ISO 27001 standard can…

Cyberattacks on City and Municipal Governments
18
May
2023

Cyberattacks on City and Municipal Governments

Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago.  The increase…

HIPAA-HITECH: Keeping the Compliance Engine Running on a Classic Data Protection Regulation
16
May
2023

HIPAA-HITECH: Keeping the Compliance Engine Running on a Classic Data Protection Regulation

By Gregory Hoffer, CEO, Coviant Software Everyone knows someone who is a vintage car nut. They keep their baby in…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
15
May
2023

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score

Abstract: Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical…

SIEM for SAP – Log Evaluation to Attack Detection
14
May
2023

SIEM for SAP – Log Evaluation to Attack Detection

By Christoph Nagy, CEO of SecurityBridge To detect attacks on SAP, you need to evaluate the security logs in SAP….

The Cybercrime Blame Game: It’s Time to Unite the Industry Against a Common Enemy.
14
May
2023

The Cybercrime Blame Game: It’s Time to Unite the Industry Against a Common Enemy.

The need for the cybersecurity industry to work together in order to combat the rising threat of cybercrime. By Brendan…

Collaboration is Key to Building Industrial Cyber Resilience
13
May
2023

Collaboration is Key to Building Industrial Cyber Resilience

By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis…

SAP Debugger’s Power and Danger
12
May
2023

SAP Debugger’s Power and Danger

By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar…

Understanding Trustworthy… - Cybersecurity Magazine
12
May
2023

Understanding Trustworthy… – Cybersecurity Magazine

It cannot have escaped you that the word trustworthy has been added to the cybersecurity lexicon in recent years: trustworthy…