Category: CyberDefenseMagazine

HIPAA-HITECH: Keeping the Compliance Engine Running on a Classic Data Protection Regulation
16
May
2023

HIPAA-HITECH: Keeping the Compliance Engine Running on a Classic Data Protection Regulation

By Gregory Hoffer, CEO, Coviant Software Everyone knows someone who is a vintage car nut. They keep their baby in…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
15
May
2023

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score

Abstract: Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical…

SIEM for SAP – Log Evaluation to Attack Detection
14
May
2023

SIEM for SAP – Log Evaluation to Attack Detection

By Christoph Nagy, CEO of SecurityBridge To detect attacks on SAP, you need to evaluate the security logs in SAP….

The Cybercrime Blame Game: It’s Time to Unite the Industry Against a Common Enemy.
14
May
2023

The Cybercrime Blame Game: It’s Time to Unite the Industry Against a Common Enemy.

The need for the cybersecurity industry to work together in order to combat the rising threat of cybercrime. By Brendan…

Collaboration is Key to Building Industrial Cyber Resilience
13
May
2023

Collaboration is Key to Building Industrial Cyber Resilience

By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis…

SAP Debugger’s Power and Danger
12
May
2023

SAP Debugger’s Power and Danger

By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar…

Understanding Trustworthy… - Cybersecurity Magazine
12
May
2023

Understanding Trustworthy… – Cybersecurity Magazine

It cannot have escaped you that the word trustworthy has been added to the cybersecurity lexicon in recent years: trustworthy…

Blockchain Startups Are Drawing Substantial Venture Capital Funding
10
May
2023

Blockchain Startups Are Drawing Substantial Venture Capital Funding

By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights Blockchain technology is becoming more popular owing to the various…

Network Security in a Cloud Era
09
May
2023

Network Security in a Cloud Era

This article is a result of me hearing this sentence uttered in a serious setting: ‘We do not need networking…

A CEO’s Guide to Not Becoming the Next Cyberattack Headline
09
May
2023

A CEO’s Guide to Not Becoming the Next Cyberattack Headline

By Sheetal Pansare, President & Global CEO of Futurism Technologies Imagine you are a CEO waking up to a Class-action…

Advancements in AI Cybersecurity: Leveraging ChatGPT to Stay Ahead of Cyber Criminals
09
May
2023

Advancements in AI Cybersecurity: Leveraging ChatGPT to Stay Ahead of Cyber Criminals

By Brian Sathianathan, Co-Founder and CTO of Iterate.ai As our world becomes more and more digitized, the threat of cyber-attacks…

Strengths and Vulnerabilities of AI Applications to Health Care
07
May
2023

Strengths and Vulnerabilities of AI Applications to Health Care

By Edward Maule, Chief Information Officer and Chief Information Security Officer at Advocare, LLC Artificial intelligence (AI) has made significant…