Category: CyberDefenseMagazine

The Impact of Mobile Threats on SMBs
18
Mar
2023

“The Impact of Mobile Threats on SMBs: 10 Simple Ways to Empower Your Company.”

By Wendy Taccetta, SVP, Small and Medium Business for Verizon Business The shift in our hybrid and remote working world…

Monitoring and Identification of Abnormal Network Traffic by Different Mathematical Models
17
Mar
2023

Monitoring and Identification of Abnormal Network Traffic by Different Mathematical Models

Abstract: The presence of anomalous traffic on the network causes some dangers to network security. To address the issue of…

Passwordless: Fact Versus Fiction
16
Mar
2023

Passwordless: Fact Versus Fiction – Cyber Defense Magazine

By Joshua Parsons, Product Marketing Manager, Enzoic With data breaches commonplace and passwords often found to be the root cause,…

Securing Collaboration at the Speed of Business
16
Mar
2023

Securing Collaboration at the Speed of Business

By Ofer Klein, CEO and co-founder, Reco Recent research found that 96% of business leaders believe that effective communication is…

Sell tickets to Fans, Not to Bots.
16
Mar
2023

Sell tickets to Fans, Not to Bots.

By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase…

Product Review of SpecOps Password Policy
14
Mar
2023

Product Review of SpecOps Password Policy

Looking for a tool to validate if your Active Directory (AD) passwords are safe across your Enterprise? Why would this…

Preventing Alert Fatigue In Cybersecurity
13
Mar
2023

Preventing Alert Fatigue In Cybersecurity

Technology is ever on the march to the future and with it comes more sophisticated and persistent cybercriminals.The digital arms…

Lessons From the Uber Hack
12
Mar
2023

Lessons From the Uber Hack

By Tomasz Kowalski, CEO and Co-Founder, Secfense For decades, cybersecurity experts have been warning us against weak or stolen passwords….

Our Nation Needs Comprehensive AI Legislation, And Soon
12
Mar
2023

Our Nation Needs Comprehensive AI Legislation, And Soon

By Dr. Allen Badeau, Chief Technology Officer, Empower AI The White House recently launched an “AI Bill of Rights” framework…

A Combination of BB84 Quantum Key Distribution and An Improved Scheme of NTRU Post-Quantum Cryptosystem
10
Mar
2023

A Combination of BB84 Quantum Key Distribution and An Improved Scheme of NTRU Post-Quantum Cryptosystem

Abstract: The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker…

How Zero Trust Enables More Effective Security Management
09
Mar
2023

How Zero Trust Enables More Effective Security Management

Moving to Zero Trust Architecture as a standard By Jim Hietala, Vice President of Business Development and Security at The…

Making the most of your time at the RSA 2023 conference
08
Mar
2023

Making the most of your time at the RSA 2023 conference

Ben Rothke, CISSP, CISM, CISA, is a Senior Information Security Manager at Tapad Going to RSA 2023? Failing to plan…