Category: CyberDefenseMagazine

A Chaos-Based Encryption Algorithm for Database System
01
May
2023

A Chaos-Based Encryption Algorithm for Database System

Abstract: This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is…

Enhance Employee Productivity by Adopting a Modern Approach to Password Security
30
Apr
2023

Enhance Employee Productivity by Adopting a Modern Approach to Password Security

By Joshua Parsons, Product Marketing Manager at Enzoic For decades, enterprise security measures and employee productivity were seemingly at odds….

Complexity is Still the Enemy of Security
30
Apr
2023

Complexity is Still the Enemy of Security

Ease of Use, Ease of Integration Encourages Data Protection By Gregory Hoffer, CEO of Coviant Software In 1999 noted cybersecurity…

Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change.
28
Apr
2023

Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change.

By Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing their…

How to Improve your Security Posture and ROI
28
Apr
2023

How to Improve your Security Posture and ROI

By Mark Evans, VP Marketing and Packet Capture Evangelist at Endace Let’s assume your security team has completed all the…

Enhance Data Center Infrastructure withAugmented Reality
28
Apr
2023

Enhance Data Center Infrastructure withAugmented Reality

AR can help facility managers optimize, expand, maintain and secure data center infrastructure. As demand for data centers grows, IT…

Security Leaders Are Finally Getting a Seat at The Table with Corporate Leadership – Make Good Use of Your Time There.
26
Apr
2023

Security Leaders Are Finally Getting a Seat at The Table with Corporate Leadership – Make Good Use of Your Time There.

Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security…

Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change
24
Apr
2023

Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change

by Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing its…

ImmuniWeb AI Platform
24
Apr
2023

ImmuniWeb AI Platform – Cyber Defense Magazine

Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb…

Can Deepfakes Beat Biometric Security?
24
Apr
2023

Can Deepfakes Beat Biometric Security?

Deepfakes present the possibility of future biometric security issues. They replicate real faces and voices to nearly identical degrees, which…

Physical Layer Key Generation Method Based on SVD Pre-processing
22
Apr
2023

Physical Layer Key Generation Method Based on SVD Pre-processing

Abstract: Environmental factors such as channel noise and hardware fingerprints affect the encryption effect of physical layer key generation techniques,…

OT Zero Trust
19
Apr
2023

OT Zero Trust – Cyber Defense Magazine

The Last Frontier to Protect OT Environments By Terence Liu, CEO, TXOne Networks OT Zero Trust – a Device-Centric Methodology…