Category: CyberDefenseMagazine
Abstract: This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is…
By Joshua Parsons, Product Marketing Manager at Enzoic For decades, enterprise security measures and employee productivity were seemingly at odds….
Ease of Use, Ease of Integration Encourages Data Protection By Gregory Hoffer, CEO of Coviant Software In 1999 noted cybersecurity…
By Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing their…
By Mark Evans, VP Marketing and Packet Capture Evangelist at Endace Let’s assume your security team has completed all the…
AR can help facility managers optimize, expand, maintain and secure data center infrastructure. As demand for data centers grows, IT…
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security…
by Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing its…
Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb…
Deepfakes present the possibility of future biometric security issues. They replicate real faces and voices to nearly identical degrees, which…
Abstract: Environmental factors such as channel noise and hardware fingerprints affect the encryption effect of physical layer key generation techniques,…
The Last Frontier to Protect OT Environments By Terence Liu, CEO, TXOne Networks OT Zero Trust – a Device-Centric Methodology…











