Category: CyberDefenseMagazine

innovator-spotlight-concentric-ai
09
Oct
2024

Innovator Spotlight: Concentric AI – Cyber Defense Magazine

It’s not enough for companies to just discover and monitor sensitive data. They need tools that can proactively fix any…

Building a robust NIS 2 compliance strategy
08
Oct
2024

Building a robust NIS 2 compliance strategy

Arriving on 17th October this year, NIS 2 is the EU’s most stringent cybersecurity Directive so far. Your level of cybersecurity…

Unmasking Shadow Apps to Secure Your SaaS Stack
08
Oct
2024

Unmasking Shadow Apps to Secure Your SaaS Stack

It is a tale almost as old as time: users click download, install, and accept as they adopt new software…

How Automation Can Help Security Policy Optimization
08
Oct
2024

How Automation Can Help Security Policy Optimization

One of the recurring questions we hear from network security leaders is “why aren’t our security policies optimized?” The answer,…

Beyond Fines: The Real Value of Achieving Cybersecurity Compliance
07
Oct
2024

Beyond Fines: The Real Value of Achieving Cybersecurity Compliance

Achieving cybersecurity compliance is often seen as a regulatory necessity, primary to avoid hefty fines and legal repercussions. However, the…

It’s Time to Sound the Alarm on SMB Cyber Threats
06
Oct
2024

It’s Time to Sound the Alarm on SMB Cyber Threats

There’s an unnerving secret many of us in cybersecurity have noticed. And if you think your company is “too small”…

Escalating Cyberattacks in the Healthcare Sector
05
Oct
2024

Escalating Cyberattacks in the Healthcare Sector

The healthcare sector has become a prime target for cyberattacks, with the frequency and sophistication of these attacks increasing rapidly…

SEC Cybersecurity Disclosure Rules – Are CISOs Ready to Go Beyond the Tip of the Iceberg?
04
Oct
2024

SEC Cybersecurity Disclosure Rules – Are CISOs Ready to Go Beyond the Tip of the Iceberg?

It’s been more than six months since the SEC’s updated Cybersecurity Disclosure rules came into force. These rules represent a…

From Detection to Defense: Evolving Risk Management Amid Rising Cybercrime
04
Oct
2024

From Detection to Defense: Evolving Risk Management Amid Rising Cybercrime

The cyber threat landscape continues to evolve rapidly. The year has not ended yet but we have witnessed an increasing…

Lockin Company’s Approach to Zero Trust Security and Rising Phishing Threats with its security software LIAPP, LIKEY, and LISS
02
Oct
2024

Lockin Company’s Approach to Zero Trust Security and Rising Phishing Threats with its security software LIAPP, LIKEY, and LISS

LIAPP (Lockin App Protector) is an integrated mobile app security service developed by Lockin Company, a Korean-based security company dedicated…

The Next Iteration of Privacy: What Businesses Should Know About New Privacy Laws in Oregon, Texas, and Florida
02
Oct
2024

The Next Iteration of Privacy: What Businesses Should Know About New Privacy Laws in Oregon, Texas, and Florida

As businesses enter the third quarter of 2024, they need to contend with three new state privacy laws. The Texas…

Fighting AI with AI: How to Improve Network Security
01
Oct
2024

Fighting AI with AI: How to Improve Network Security

The generative AI revolution is creating turmoil in the cybersecurity world. Security has always been a technologyrace. On one hand, it’s a…