Category: CyberDefenseMagazine

Steps To Protect Against Cybersecurity Threats During Mergers and Acquisitions
09
Dec
2024

Steps To Protect Against Cybersecurity Threats During Mergers and Acquisitions

Transactions involving U.S. targets and acquirers continue to represent a substantial percentage of overall deal volume, with U.S. M&A exceeding…

It Takes a Village – and a Lot of Time – to Manage Data Security and Compliance
09
Dec
2024

It Takes a Village – and a Lot of Time – to Manage Data Security and Compliance

For security teams, sensitive content is generally at the centre of what they need to protect in their corporate IT…

Apple & OpenAI’s New Features: A First Look Through the Eyes of the US’ First Female CIO
06
Dec
2024

Apple & OpenAI’s New Features: A First Look Through the Eyes of the US’ First Female CIO

Even before my time in The White House, I was – and continue to be – captivated by the intersection…

Lessons from the Global IT Outage of July 19, 2024
06
Dec
2024

Lessons from the Global IT Outage of July 19, 2024

On Friday, July 19, 2024, the world experienced a massive IT outage that disrupted businesses, governments, and other users across…

How AI Helps Security Teams at Samsara and Ekco Move Faster and Enhance Decision-Making
06
Dec
2024

How AI Helps Security Teams at Samsara and Ekco Move Faster and Enhance Decision-Making

Despite the enormous potential of AI, its impact on security operations has often fallen short, with teams grappling with privacy concerns,…

The Initial Engagement Process for Contracting with a vCISO
06
Dec
2024

The Initial Engagement Process for Contracting with a vCISO

Introduction In today’s fast-paced digital world, organizations face a myriad of cybersecurity challenges that demand expert guidance and strategic oversight….

Shifting The Focus: From Compliance to Secops In Supply Chain Security
06
Dec
2024

Shifting The Focus: From Compliance to Secops In Supply Chain Security

There are two main reasons why supply chain attacks are on the increase. First, there is a general trend of…

DSPM vs. CSPM: Understanding Modern Security Postures
03
Dec
2024

DSPM vs. CSPM: Understanding Modern Security Postures

Making sense of modern security postures can be challenging. In the past few years, the complexity of most IT environments…

The Importance of Data Anonymization In Safeguarding Sensitive Legal Information
01
Dec
2024

The Importance of Data Anonymization In Safeguarding Sensitive Legal Information

Several high-profile and global law firms have been under the radar of cyber-security data breaches. For instance, the Mossack Fonseca…

Can ChatGPT help someone with no coding skills build ransomware?
30
Nov
2024

Can ChatGPT help someone with no coding skills build ransomware?

There’s no doubt that generative AI is having a significant impact on the cyber security ecosystem, with software vendors, security teams, and…

The Last Stop: Protecting an NHL Franchise Against Cyberattacks
30
Nov
2024

The Last Stop: Protecting an NHL Franchise Against Cyberattacks

For the Seattle Kraken, the National Hockey League’s 32nd franchise, maintaining a strong defense off the ice—one that keeps cyber…

The Evolution of Cloud Strategy: Beyond “Cloud First”
29
Nov
2024

The Evolution of Cloud Strategy: Beyond “Cloud First”

In the rapidly evolving digital landscape, the mantra “Cloud First” is becoming a relic of the past. Today, organizations are…