Category: CyberDefenseMagazine

A Question of Doubt
04
Apr
2023

A Question of Doubt – Cyber Defense Magazine

The cyber security crisis of confidence amongst CISOs and CIOs — and how to overcome it. By Gary Penolver, Chief…

Cybersecurity Strategies for SMEs in the Nordic Baltic Region
03
Apr
2023

Cybersecurity Strategies for SMEs in the Nordic Baltic Region

Abstract: Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the…

Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.
31
Mar
2023

Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.

By Dan Richings – Senior Vice President, Global Presales, Solutions Engineering, and Support – Adaptiva Using third-party software is unavoidable…

NIS2 and the chain liability’s impact on Secure Software Development
31
Mar
2023

NIS2 and the chain liability’s impact on Secure Software Development

If you are a software supplier and your customer is covered by the EU NIS2 directive, you might very well…

Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”
30
Mar
2023

Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”

By James Hess, CEO of Unknown Cyber Cybersecurity is a critical issue that affects organizations of all sizes and industries,…

Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there
30
Mar
2023

Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there

Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security…

As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security
30
Mar
2023

As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security

By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to…

Eight Tips for CISOs Trying Get Their Board on Board
28
Mar
2023

Eight Tips for CISOs Trying Get Their Board on Board

By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role…

Next Generation Cybersecurity for Small to Midsize Businesses
28
Mar
2023

Next Generation Cybersecurity for Small to Midsize Businesses

How Cynet is giving lean security teams the tools they need to protect their business as budget crunches and reduced…

Zero Trust in a DevOps World
26
Mar
2023

Zero Trust in a DevOps World

By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical…

Why tackling financial crime calls for a privacy-first approach
25
Mar
2023

Why Tackling Financial Crime Calls for A Privacy-First Approach

By Dr. Alon Kaufman, CEO and Co-Founder of Duality Technologies To gain the upper hand in the fight against financial…

Why You Can
24
Mar
2023

Why You Can’t Have True Zero Trust Without API Security

By Richard Bird, Chief Security Officer, Traceable Global adoption of Zero Trust security models is soaring and with good reason….