Category: CyberDefenseMagazine
Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of…
With all the recent hype, many may not realize artificial intelligence is nothing new. The idea of thinking machines was…
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate…
Navigating the complex web of compliance in the AI era is a formidable challenge, and aligning your organization with existing…
As the world of software development accelerates, the need to secure applications from the earliest stages of development has become…
Forget Game of Thrones and House of The Dragon; the real battle for power is between cyber criminals and security…
The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much…
I was thrilled to catch up with Horizon3.ai during Black Hat USA 2024. Most attackers don’t break in, they log…
Cyber-Informed Engineering (CIE) is a new perspective on OT cyber risk – one that is being embraced by OT/engineering teams and…
I was thrilled to catch up with Checkmarx during Black Hat USA 2024. Cloud development transformation has ushered in a…
Despite the increasing number of cybersecurity tools available, attacks continue to succeed at an alarming rate. Studies show that more…
Vulnerability management has become more critical than ever as the global cost of cybercrime is projected to reach $10.5 trillion…