Category: CyberDefenseMagazine

SMBs Know the Risks, So Why Are Cybercriminals Still Winning?
09
Aug
2025

SMBs Know the Risks, So Why Are Cybercriminals Still Winning?

Cybercriminals are no longer primarily focused on large enterprises. They now see small- and medium-sized businesses (SMBs) as prime targets…

Print Friendly, PDF & Email
09
Aug
2025

Why an Effective Detection and Response Strategy Must Focus on Very Attacked People (VAPs)

When a business is considering its vulnerabilities and turns to consider which of its people might pose the most of…

Are You Sending the Wrong Signals?
08
Aug
2025

Are You Sending the Wrong Signals?

The Salt team has spent the last 5-10 years producing blogs, comparison documents and webinars which highlight our credentials versus…

Saas Security Best Practices
08
Aug
2025

Saas Security Best Practices – Cyber Defense Magazine

Software as a Service (SaaS) is the prevalent software distribution model in the tech industry. Whether you are a young…

Risk Has Moved Beyond Your Inbox
07
Aug
2025

Risk Has Moved Beyond Your Inbox

For years, email was the main security battleground. Phishing, scams, and account takeovers were problems companies knew how to fight—at…

Retail Budgets at Risk: Price-Scraping and Fraudulent Bot Attacks Are on The Rise
07
Aug
2025

Retail Budgets at Risk: Price-Scraping and Fraudulent Bot Attacks Are on The Rise

Competition in the eCommerce industry is becoming increasingly rivalled. As consumers turn to online stores, more and more retailers are…

Effortless Cloud Security: A Beginner’s Checklist for a Safer Cloud Environment
06
Aug
2025

Effortless Cloud Security: A Beginner’s Checklist for a Safer Cloud Environment

In the past few years, the world has embraced a new era of AI, introducing an array of security tools…

Preventing Costly Data Breaches Requires a Robust Physical and Digital Security Posture
06
Aug
2025

Preventing Costly Data Breaches Requires a Robust Physical and Digital Security Posture

Independent market research firm Vanson Bourne recently conducted a study querying 1,000 senior IT decision-makers across the US and EMEA…

Post Quantum Threats – The Encryption Apocalypse That Isn’t
05
Aug
2025

Post Quantum Threats – The Encryption Apocalypse That Isn’t

Preface RSA Conference just wrapped up, and while phrases like “We are an Agentic AI solution for XYZ,” “AI in…

There Are Plenty of Phish in The Sea: Here’s How to Avoid Them
05
Aug
2025

There Are Plenty of Phish in The Sea: Here’s How to Avoid Them

When was the last time you revisited your organization’s email security practices? Is your current software up to the task…

Print Friendly, PDF & Email
05
Aug
2025

Artificial Intelligence in Action w/ prof. Ahmed Banafa

We spoke with Prof. Ahmed Banafa from San Jose State University about his latest work, Artificial Intelligence in Action: Real-World…

05
Aug
2025

Artificial Intelligence in Action w/ prof. Ahmed Banafa

We spoke with Prof. Ahmed Banafa from San Jose State University about his latest work, Artificial Intelligence in Action: Real-World…