Category: CyberDefenseMagazine
By Wendy Taccetta, SVP, Small and Medium Business for Verizon Business The shift in our hybrid and remote working world…
Abstract: The presence of anomalous traffic on the network causes some dangers to network security. To address the issue of…
By Joshua Parsons, Product Marketing Manager, Enzoic With data breaches commonplace and passwords often found to be the root cause,…
By Ofer Klein, CEO and co-founder, Reco Recent research found that 96% of business leaders believe that effective communication is…
By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase…
Looking for a tool to validate if your Active Directory (AD) passwords are safe across your Enterprise? Why would this…
Technology is ever on the march to the future and with it comes more sophisticated and persistent cybercriminals.The digital arms…
By Tomasz Kowalski, CEO and Co-Founder, Secfense For decades, cybersecurity experts have been warning us against weak or stolen passwords….
By Dr. Allen Badeau, Chief Technology Officer, Empower AI The White House recently launched an “AI Bill of Rights” framework…
Abstract: The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker…
Moving to Zero Trust Architecture as a standard By Jim Hietala, Vice President of Business Development and Security at The…
Ben Rothke, CISSP, CISM, CISA, is a Senior Information Security Manager at Tapad Going to RSA 2023? Failing to plan…











