Category: CyberDefenseMagazine

Career Profile: David Soldani, Rakuten
17
Apr
2023

Career Profile: David Soldani, Rakuten

Name: David SoldaniAffiliation: Rakuten Can you briefly introduce your current role in cybersecurity? Areas of my responsibility and expertise include,…

It’s 2023 – You MUST Know The SaaS Applications Your Employees Are Using
17
Apr
2023

It’s 2023 – You MUST Know The SaaS Applications Your Employees Are Using

Organizations should have free access to their SaaS attack layer  By Galit Lubetzky Sharon, Co-Founder & CTO, Wing Security While…

How to Protect Your Ecommerce Site from Cybersecurity Threats
17
Apr
2023

How to Protect Your Ecommerce Site from Cybersecurity Threats

By Karl Pulanco, Product Portfolio Manager, Yondu Modern businesses no longer need a physical store to sell goods and services….

2023:  What Awaits Us?
15
Apr
2023

2023: What Awaits Us? – Cyber Defense Magazine

By Ashley Stephenson, CTO, Corero Network Security When it comes to cyber security, one thing that 2022 and just about…

ChatGPT and You
15
Apr
2023

ChatGPT and You – Cyber Defense Magazine

Or I’m No Fool with Weaponized AI By Guy Rosefelt, Chief Product Officer, Sangfor Technologies Okay, I admit the title…

Balancing New Technologies and Ease of Use in Infrastructure Cybersecurity Programs
14
Apr
2023

Balancing New Technologies and Ease of Use in Infrastructure Cybersecurity Programs

The importance of cybersecurity in critical infrastructure was first recognized in the power industry with the creation of North American…

Construction of a Smart City Network Information Security Evaluation Model Based on GRA-BPNN
11
Apr
2023

Construction of a Smart City Network Information Security Evaluation Model Based on GRA-BPNN

Abstract: In this study, we propose an optimized network information security evaluation GRA-BPNN model based on gray correlation analysis method…

Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
10
Apr
2023

Organizations Have Security Priorities Mismatched as Breaches Continue to Rise

By Tyler Farrar, CISO, Exabeam According to the Exabeam State of the SIEM survey, security professionals remain confident in the…

The Practical Side of ZTNA: How it Helps Harden Defenses
10
Apr
2023

The Practical Side of ZTNA: How it Helps Harden Defenses

By Timothy Liu, CTO and co-founder, Hillstone Networks In the cybersecurity world, buzzwords seem proliferate with the changing of the…

Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework
08
Apr
2023

Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework

By Kaustubh Medhe, Head of Research and Intelligence A recent market survey report (Source: Fortune Business Insights, March 2023) pegged…

Using OAuth2 to Secure Your APIs
07
Apr
2023

Using OAuth2 to Secure Your APIs

APIs (Application Programming Interfaces) are gradually becoming critical aspects of software interaction and integration over the internet, allowing fast and…

Cloud Visibility and Port Spoofing: the “Known Unknown”
04
Apr
2023

Cloud Visibility and Port Spoofing: the “Known Unknown”

By Stephen Goudreault, Cloud Security Evangelist, Gigamon As with all technology, new tools are iterations built on what came before…