Category: CyberDefenseMagazine

14
Aug
2025

Stopping Fraud: What Does Email Got to Do with It?

With 7.9 billion email accounts worldwide and 4.3 billion active users, emails now play an essential role in fraud detection and identity verification….

Black Hat USA 2025 – AI, Innovation, and the Power of the Cybersecurity Community
13
Aug
2025

Black Hat USA 2025 – AI, Innovation, and the Power of the Cybersecurity Community

By Gary Miliefsky, Publisher of Cyber Defense Magazine Black Hat, the cybersecurity industry’s most established and in-depth security event series,…

The Looming Domino Effect of Cyberattacks on Energy and Utilities
13
Aug
2025

The Looming Domino Effect of Cyberattacks on Energy and Utilities

When systems go dark and become unavailable, consumers and operators may feel frustration, panic, and anger. When there is disruption…

The Limitations of Agentic AI in Cybersecurity: Why Large-Scale Autonomous Cyberattacks Aren’t Yet a Reality
13
Aug
2025

The Limitations of Agentic AI in Cybersecurity: Why Large-Scale Autonomous Cyberattacks Aren’t Yet a Reality

There are a few universal rules that apply in the ongoing cybersecurity arms race between attackers and security companies. The…

AI Takes Center Stage at Black Hat USA 2025 – Booz Allen Leads the Conversation
13
Aug
2025

AI Takes Center Stage at Black Hat USA 2025 – Booz Allen Leads the Conversation

Black Hat USA 2025 was nothing short of groundbreaking. The show floor and conference tracks were buzzing with innovation, but…

The Inevitable AI Breach? Predicting Data Theft Through Shared Vulnerabilities
12
Aug
2025

The Inevitable AI Breach? Predicting Data Theft Through Shared Vulnerabilities

Statistics shared by the World Economic Forum in 2024 show healthcare and finance to be the top two industries most targeted by…

The Impact of Cloud computing in 2025
12
Aug
2025

The Impact of Cloud computing in 2025

Key Trends Driving Cloud Computing in 2025 Smarter Cloud Tools with AI Artificial Intelligence (AI) and Machine Learning (ML) have…

The Hidden Danger: Secrets Sprawl Beyond the Codebase
11
Aug
2025

The Hidden Danger: Secrets Sprawl Beyond the Codebase

GitGuardian’s 2025 State of Secrets Sprawl Report reveals an alarming expansion of credential exposure across enterprise environments, with collaboration tools…

The Future of Automotive Cybersecurity Safeguarding the Next Generation of Mobility
11
Aug
2025

The Future of Automotive Cybersecurity Safeguarding the Next Generation of Mobility

The Current Landscape of Automotive Cybersecurity Modern vehicles are essentially computers on wheels. With up to 100 million lines of…

The AI Threat: How Enterprises Can Defend Against the Next Generation of Attacks
10
Aug
2025

The AI Threat: How Enterprises Can Defend Against the Next Generation of Attacks

AI is transforming the way work gets done across industries. But while it improves business efficiencies, it also arms cybercriminals…

Telcom Security: The Intersection of Critical Infrastructure
10
Aug
2025

Telcom Security: The Intersection of Critical Infrastructure

Telecommunications service providers (TSP) are foundational to the functioning of our modern technical society, serving as the conduit through which…

The Future of API Security Reviews
09
Aug
2025

The Future of API Security Reviews

As organizations increasingly rely on application programming interfaces (APIs) to facilitate communication and data exchange between software systems, these “gates”…