Category: CyberDefenseMagazine

The Other Lesson from the XZ Utils Supply-Chain Attack
29
Jul
2024

The Other Lesson from the XZ Utils Supply-Chain Attack

“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in…

Eliminating the Last Mile Between Security Data and Decision Making
28
Jul
2024

Eliminating the Last Mile Between Security Data and Decision Making

Once upon a time, when we used to have to go to physical stores to get the products we needed,…

Artificial Intelligence in 2024
28
Jul
2024

Artificial Intelligence in 2024 – Cyber Defense Magazine

Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so…

Unlocking the Power of Behavioral Cloud Native Threat Detection and Response
27
Jul
2024

Unlocking the Power of Behavioral Cloud Native Threat Detection and Response

Behavioral detection and response is not a new concept, and the top three detection and response players command a combined…

Sheltering from the Cyberattack Storm
26
Jul
2024

Sheltering from the Cyberattack Storm

As we move towards the summer and the promise of sunnier weather, it’s worth noting that the cybersecurity industry has…

Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management
26
Jul
2024

Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management

The massive Snowflake breach disclosed recently, involving hundreds of millions of stolen customer records, is a stark wake-up call for…

Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management
25
Jul
2024

Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management

Single Sign-On (SSO) serves as the linchpin connecting corporate networks, facilitating seamless access to various web applications without the need…

Securing AI Models - Recommendation and Best Practices
25
Jul
2024

Securing AI Models – Recommendation and Best Practices

Generative AI (Artificial Intelligence) has turned out to be a game changer after the introduction of ChatGPT, DALL-E, Bard, Gemini,…

How the Newest Tech Changes Cybersecurity Needs in the Legal Industry
24
Jul
2024

How the Newest Tech Changes Cybersecurity Needs in the Legal Industry

Responsibly Adopting Technology to Improve Law Firm Productivity Lawyers face incredible pressure in their jobs to perform accurately and quickly….

5 Reasons IGA Programs Fail
23
Jul
2024

5 Reasons IGA Programs Fail

Identity governance and administration (IGA) is a critical part of modern business. It’s one of the single most important pieces…

Pioneering the New Frontier in AI Consumer Protection and Cyber Defense
22
Jul
2024

Pioneering the New Frontier in AI Consumer Protection and Cyber Defense

In a groundbreaking move, the first state in the U.S. has passed comprehensive legislation aimed at protecting consumers from the…

Digital Identities Have Evolved — Cyber Strategies Should Too
22
Jul
2024

Digital Identities Have Evolved – Cyber Strategies Should Too

The scale of identity exposure has increased significantly, with over 90% of surveyed organizations reporting an identity-related breach within the last year….