Category: CyberDefenseMagazine

The Quantum Threat: Our Government Knows More Than You Do
07
Feb
2023

The Quantum Threat: Our Government Knows More Than You Do

By Skip Sanzeri, COO and Founder, QuSecure, Inc. Quantum computers are extremely powerful machines that utilize subatomic properties providing amazing…

A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks
06
Feb
2023

A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks

Abstract: In this day and age, Internet has become an innate part of our existence. This virtual platform brings people…

The Benefits of eBPF for API Security
05
Feb
2023

The Benefits of eBPF for API Security

By Sanjay Nagaraj, Co-Founder & CTO of Traceable AI You might hear the term “eBPF” mentioned when chatting to DevOps…

The Importance To Provide Buyers And Sellers Secure, Convenient, And Frictionless Payment Experiences
05
Feb
2023

The Importance To Provide Buyers And Sellers Secure, Convenient, And Frictionless Payment Experiences

By Héctor Guillermo Martínez, President GM Sectec The COVID-19 pandemic accelerated the adoption of digital payments globally and especially in…

The Psychology Behind Spear Phishing Scams
05
Feb
2023

The Psychology Behind Spear Phishing Scams

By Dr. Yvonne Bernard, CTO, Hornetsecurity Criminals are increasingly using fake emails to exploit their victims for financial gain and…

The ‘New Cold War’ Continues To Mark Urgency For Organisations To Bolster Cyber-Resilience
03
Feb
2023

The ‘New Cold War’ Continues To Mark Urgency For Organisations To Bolster Cyber-Resilience

By Dave Adamson, Chief Technology Officer at EspriaEncourages businesses to re-claim authority over their networks, thereby enhancing cyber-resilience in the…

NetFlow’s Dirty Little Secret
03
Feb
2023

NetFlow’s Dirty Little Secret – Cyber Defense Magazine

By Mark Evans, VP Marketing, Endace Many organizations assume their security tools can see everything that happens across the network…

Trusted Computing - An Introductory Overview
03
Feb
2023

Trusted Computing – An Introductory Overview

Firmware security risks One of the most neglected areas of cyber security is the firmware that underpins every device –…

Secure APIs to Drive Digital Business
01
Feb
2023

Secure APIs to Drive Digital Business

By Mourad Jaakou, General Manager Amplify at Axway Back in 2010, API Evangelist blogger Kin Lane posited that application programming…

Security in gaming: How to Recognize and Prevent Social Engineering Attacks in Gaming
01
Feb
2023

Security in gaming: How to Recognize and Prevent Social Engineering Attacks in Gaming

What is social engineering? By Jenna Greenspoon, Head of Parenting, Kidas As an avid internet user, it’s likely that at…

Table Stakes Security Services for 2023
01
Feb
2023

Table Stakes Security Services for 2023

By Jim Mundy, Director of Security Operations, Segra Most business owners may be aware of cybersecurity defenses such as firewall,…

Moola Market Manipulation
30
Jan
2023

Moola Market Manipulation – Cyber Defense Magazine

Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a…