Category: CyberDefenseMagazine

transparency-in-cybersecurity-the-importance-of-accurate-vulnerability-disclosures
09
Aug
2024

Transparency in Cybersecurity: The Importance of Accurate Vulnerability Disclosures

Recently, the cybersecurity world has been rattled by a series of critical vulnerabilities discovered in Ivanti Connect Secure VPN software….

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter
07
Aug
2024

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter

I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My…

Getting the measure of ransomware – the vital role of tape technology
07
Aug
2024

Getting the measure of ransomware – the vital role of tape technology

The rapidly expanding global data storage market is being fuelled by a range of powerful tech trends. From the exponential…

whos-minding-the-store-why-operational-technology-security-has-become-a-top-priority-for-federal-security-leaders
05
Aug
2024

Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders

The Federal OT footprint – from military base operations to their public utilities, from postal operations to NASA missions –…

The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth
04
Aug
2024

The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth

Data security and consumer trust go hand-in-hand in our evolving digital world There’s no doubt that data is a catalyst…

it-is-time-for-smart-cyber-requirements-for-the-water-sector
03
Aug
2024

It Is Time for Smart Cyber Requirements for the Water Sector

Since 2021, the Biden Administration has been consistently talking about the limitations of a purely voluntary approach to cybersecurity for…

Looking Past DevOps: AI, ClickOps and Platform Engineering
02
Aug
2024

Looking Past DevOps: AI, ClickOps and Platform Engineering

About fifteen years ago, DevOps radically overhauled the world of software engineering. Previously, the development process had been defined by…

The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare
01
Aug
2024

The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare

In an alarming revelation, Kaiser Foundation Health Plan reported a data breach impacting over 13 million individuals. For years, there…

Analyzing the CrowdStrike Update Outage: Insights and Lessons from Maxine Holt on the Impact and Future of Cybersecurity Practices
31
Jul
2024

Analyzing the CrowdStrike Update Outage: Insights and Lessons from Maxine Holt on the Impact and Future of Cybersecurity Practices

On July 19, 2024, a critical update to CrowdStrike’s Falcon agent led to a significant global IT outage, affecting numerous…

How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert
31
Jul
2024

How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert

It doesn’t take much to guess why cybercriminals increasingly target banking applications including emerging fintech and trading as their prime…

Mitigating Data Breaches with AI-Driven Security Solutions
29
Jul
2024

Mitigating Data Breaches with AI-Driven Security Solutions

SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes,…

The Dual Nature of Ransomware Attacks
29
Jul
2024

The Dual Nature of Ransomware Attacks

Financial Gain and Geopolitical Strategy Ransomware attacks have evolved from mere cybercriminal activities to sophisticated operations serving dual purposes: financial…