Category: CyberDefenseMagazine
By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of…
Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important…
Europe’s cyber industry has huge potential. Copying what’s worked in the US is a route to realising that promise. By…
By Leonid Belkind, CTO and Co-Founder, Torq Security automation continued to have significant, positive impact across myriad cybersecurity applications in…
Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works…
By Dannie Combs, SVP and Chief Information Security Officer, Donnelley Financial Solutions (DFIN) Don’t let the name fool you: dark…
Abstract: Technological developments make it easier for people to communicate and share information. Facebook Messenger is an instant messenger that…
By Camellia Chan, CEO & founder of Flexxon I was honored to be one of the representatives from 36 nations,…
By Russ Reeder, CEO, Netrix Global Ensuring 100% prevention against all cyberattacks is impossible today, as modern perpetrators find more…
New Research Results from Omdia and Cybrary Point to Substantial ROI From Continuous Upskilling of Cybersecurity Teams. By Kevin Hanes,…
By Zac Amos, Features Editor, ReHack Organizations and individuals must implement multi-factor authentication strategies to enhance any cybersecurity risk management…
By Dr. Chenxi Wang, Founder and Managing General Partner, Rain Capital For venture capitalists and investors with an eye on…











