Category: CyberDefenseMagazine

Has Adoption of ‘Connected Devices’ Outpaced Security?
08
Mar
2023

Has Adoption of ‘Connected Devices’ Outpaced Security?

By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of…

How to Stay GDPR Compliant While Sending Cold Emails
08
Mar
2023

How to Stay GDPR Compliant While Sending Cold Emails

Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important…

Europe Envies America’s Cybersecurity Industry. What Can We Learn from It?
06
Mar
2023

Europe Envies America’s Cybersecurity Industry. What Can We Learn from It?

Europe’s cyber industry has huge potential. Copying what’s worked in the US is a route to realising that promise. By…

Expanding Macroeconomic Pressure And Attack Surface Will Drive Security Automation In 2023
06
Mar
2023

Expanding Macroeconomic Pressure And Attack Surface Will Drive Security Automation In 2023

By Leonid Belkind, CTO and Co-Founder, Torq Security automation continued to have significant, positive impact across myriad cybersecurity applications in…

Cybersecurity: Your Guide to Digital Identity
04
Mar
2023

Cybersecurity: Your Guide to Digital Identity

Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works…

Does Your Company Have a Dark Data Problem?
04
Mar
2023

Does Your Company Have a Dark Data Problem?

By Dannie Combs, SVP and Chief Information Security Officer, Donnelley Financial Solutions (DFIN) Don’t let the name fool you: dark…

A Comparative Analysis of Digital Forensic Investigation Tools on Facebook Messenger Applications
03
Mar
2023

A Comparative Analysis of Digital Forensic Investigation Tools on Facebook Messenger Applications

Abstract: Technological developments make it easier for people to communicate and share information. Facebook Messenger is an instant messenger that…

Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush?
02
Mar
2023

Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush?

By Camellia Chan, CEO & founder of Flexxon I was honored to be one of the representatives from 36 nations,…

Cybersecurity Attacks To Come: Here’s How To Prepare
02
Mar
2023

Cybersecurity Attacks To Come: Here’s How To Prepare

By Russ Reeder, CEO, Netrix Global Ensuring 100% prevention against all cyberattacks is impossible today, as modern perpetrators find more…

Busting Myths Around Cybersecurity Team Training
28
Feb
2023

Busting Myths Around Cybersecurity Team Training

New Research Results from Omdia and Cybrary Point to Substantial ROI From Continuous Upskilling of Cybersecurity Teams. By Kevin Hanes,…

5 Best Practices for a Multi-Factor Authentication (MFA) Strategy
28
Feb
2023

5 Best Practices for a Multi-Factor Authentication (MFA) Strategy

By Zac Amos, Features Editor, ReHack Organizations and individuals must implement multi-factor authentication strategies to enhance any cybersecurity risk management…

2023 Predictions
28
Feb
2023

2023 Predictions – Cyber Defense Magazine

By Dr. Chenxi Wang, Founder and Managing General Partner, Rain Capital For venture capitalists and investors with an eye on…