Category: CyberDefenseMagazine

Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms
24
Mar
2023

Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms

Abstract: The involvement of the Internet in the production of daily life has increased the demand for the security of…

The WAN Under Siege
23
Mar
2023

The WAN Under Siege – Cyber Defense Magazine

WAN managers say they’re adopting zero trust security and using multiple infrastructure security vendors in response to the latest threats…

Stop Backing Up Ransomware
23
Mar
2023

Stop Backing Up Ransomware – Cyber Defense Magazine

By James Gorman When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for…

There’s no way you’re still using Consumer Messaging Apps for Business
23
Mar
2023

There’s no way you’re still using Consumer Messaging Apps for Business

By Nicole Allen, Senior Marketing Executive, Salt Communications Consumer messaging apps are routinely utilised for business purposes even if they…

Top 5 Questions to Ask When You’re Building a Cloud Security Strategy
22
Mar
2023

Top 5 Questions to Ask When You’re Building a Cloud Security Strategy

By Metin Kortak, chief information security officer, Rhymetec As companies began moving their computing operations and data storage to the…

Vulnerability Prioritization is Not a One-Size Fits All Approach
22
Mar
2023

Vulnerability Prioritization is Not a One-Size Fits All Approach

By Victor Gamra, CISSP, Founder and CEO of FortifyData System vulnerabilities are ever increasing as adoption of new and emerging…

Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future
22
Mar
2023

Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future

By Dr Ali El Kaafarani, Founder and CEO of PQShield July 5th, 2022, marked an important milestone in the fight…

22
Mar
2023

Remaining Proactive at Identifying Risks Keeps You Ahead of Hackers

By Carl Torrence, Content Marketer at Marketing Digest Why is cybersecurity such a big issue in organizations all over the…

Cybersecurity and Digital Transformation: Busting the Myths
20
Mar
2023

Cybersecurity and Digital Transformation: Busting the Myths

It’s -30 Celsius in December. An entire city has gone dark. There is no electricity, heating, internet, or telecommunications—all because…

Solving The AppSec Dilemma Across the Entire SDLC
19
Mar
2023

Solving The AppSec Dilemma Across the Entire SDLC

Why organizations should adopt an integrated and continuous approach to application security education By Amy Baker, Security Education Evangelist, Security…

The Biggest Cyber Threats For The Financial Industry In 2023
19
Mar
2023

The Biggest Cyber Threats For The Financial Industry In 2023

By Ben Herzberg, Chief Scientist of Satori According to external market data, the financial sector was the most attacked in…

The California Consumer Privacy Act (CCPA) and the American Data Privacy Protection Act: The Good, The Bad and The Ugly
18
Mar
2023

The California Consumer Privacy Act (CCPA) and the American Data Privacy Protection Act: The Good, The Bad and The Ugly

By Dr. Eric Cole, Advisor – Theon Technology Since 2018, there has been serious discussion of a new national privacy…