Category: CyberDefenseMagazine

Innovator Spotlight: ESET
19
Jun
2025

Innovator Spotlight: ESET – Cyber Defense Magazine

Cybersecurity’s Enduring Guardians: ESET’s 35-Year Journey of Threat Intelligence The Berlin Wall crumbled, and from its digital shadows emerged a…

The Rise of Identity Risk Intelligence
19
Jun
2025

The Rise of Identity Risk Intelligence

For many years, cybersecurity professionals have relied on Indicators of Compromise (IOCs) such as IP addresses, domain names, and file…

Publisher’s Spotlight: NAKIVO Backup & Replication v11
18
Jun
2025

Publisher’s Spotlight: NAKIVO Backup & Replication v11

A Powerful, All-in-One Solution for Cyber-Resilient Backup and Recovery In an era where ransomware, cloud complexity, and regulatory pressures are…

The Quantum Supply Chain Risk: How Quantum Computing Will Disrupt Global Commerce
17
Jun
2025

The Quantum Supply Chain Risk: How Quantum Computing Will Disrupt Global Commerce

The Global Supply Chain Is Already on Fire — We Just Don’t See the Smoke. The global supply chain is…

Print Friendly, PDF & Email
17
Jun
2025

Why backups are key to driving down cyber insurance

It wasn’t long ago that the cyber insurance market was in a highly precarious position. In the aftermath of the…

Ongoing Money Laundering Insights
16
Jun
2025

Ongoing Money Laundering Insights – Cyber Defense Magazine

Abstract Money laundering is a major financial crime that involves introducing illicitly obtained funds into legitimate financial systems to disguise…

The Impact of Quantum Decryption
16
Jun
2025

The Impact of Quantum Decryption

Executive Summary Quantum computing’s rapid progress poses a significant threat, potentially rendering current encryption methods and nearly all encrypted data…

The Growing Threat of AI-powered Cyberattacks in 2025
15
Jun
2025

The Growing Threat of AI-powered Cyberattacks in 2025

Data breach costs are rising at breakneck speed. IBM reported that the global average security breach cost is $4.9 million, marking…

The Cost of Ignoring Patches: How State and Local Governments Can Mitigate Damaging Security Breaches
15
Jun
2025

The Cost of Ignoring Patches: How State and Local Governments Can Mitigate Damaging Security Breaches

According to a recent report released by the Multi-State Information Sharing and Analysis Center, governmental agencies are facing an increase in…

Securing the Connected Factory Floor
14
Jun
2025

Securing the Connected Factory Floor

As manufacturers strive to keep pace with changing demands and quickly evolving technologies, many are embracing digitalization and increased connectivity…

Small Manufacturers, Big Target: The Growing Cyber Threat and How to Defend Against It
14
Jun
2025

Small Manufacturers, Big Target: The Growing Cyber Threat and How to Defend Against It

Digital transformation in manufacturing has opened doors to promising possibilities, but not without new risk exposure. With expansive transformation comes…

On Constant Community Improvements
12
Jun
2025

On Constant Community Improvements – Cyber Defense Magazine

The theme of this year’s RSAC is “Many Voices. One Community.” While our field can rightly claim “many voices”, portraying…