Category: CyberDefenseMagazine

Managing Cybersecurity for Critical National Infrastructure
28
Jan
2023

Managing Cybersecurity for Critical National Infrastructure

General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant,…

4 Biggest Supply Chain Security Threats to Watch in 2023
27
Jan
2023

4 Biggest Supply Chain Security Threats to Watch in 2023

The supply chain sector has always been a magnet for theft and fraud, but these risks multiply in the age…

Remote Workers Face Growing Threats from Phishing Attacks
26
Jan
2023

Remote Workers Face Growing Threats from Phishing Attacks

Analysis Shows Phishing Strikes Up 61% Over 2021,  With a 50% Increase on Mobile Devices By Patrick Harr, CEO, SlashNext…

Infrastructure-as-Code Security: a Critical Responsibility
26
Jan
2023

Infrastructure-as-Code Security: a Critical Responsibility

By Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries….

Mobile App APIs Are Crucial to Businesses – But Are Under-Protected
25
Jan
2023

Mobile App APIs Are Crucial to Businesses – But Are Under-Protected

The State of Mobile Security in 2022” Underscores Both the Importance of Mobile Apps and the Relative Lack of Resources…

How Does a Botnet Attack Work?
24
Jan
2023

How Does a Botnet Attack Work?

By Zac Amos, Features Editor, ReHack Keeping up with cybercriminals is a full-time job, as new attack types appear daily….

How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce
24
Jan
2023

How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce

By Raul Popa, CEO & Co-Founder, TypingDNA Like other types of insurance, Cybersecurity Insurance protects businesses in case of a…

An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering
23
Jan
2023

An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering

Abstract: Role Based Access Control (RBAC) systems face an essential issue related to systematic handling of users’ access requests known…

How 5G Networks Are Secured and Enabled By SASE
22
Jan
2023

How 5G Networks Are Secured and Enabled By SASE

By Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and…

The Rise in Cyber-Attacks from Bad International Actors
20
Jan
2023

The Rise in Cyber-Attacks from Bad International Actors

There has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems from…

We Need Quality Data Recovery in an Age ofIncreased Cyberattacks
20
Jan
2023

We Need Quality Data Recovery in an Age ofIncreased Cyberattacks

A comprehensive cybersecurity strategy involves data recovery now more than ever. A solid plan could save organizations from the most…

Doenerium: When Stealing from Thieves Is Also a Crime
18
Jan
2023

Doenerium: When Stealing from Thieves Is Also a Crime

By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat…