Category: CyberDefenseMagazine

Protecting Your SaaS Applications – A Security Guide
09
Sep
2024

Protecting Your SaaS Applications – A Security Guide

An All-encompassing Approach to Prevent Breaches Organizations depend deeply on technology and data to run their businesses. The recent transition…

When CIOs and CFOs Align, Businesses Thrive
09
Sep
2024

When CIOs and CFOs Align, Businesses Thrive

The C-suite drives business strategy and shapes a company’s future. Communication and alignment between key players are paramount, yet silos…

Artificial Intelligence and Cybersecurity: A New Era of Defense
09
Sep
2024

Artificial Intelligence and Cybersecurity: A New Era of Defense

Is AI a pain and hassle for Cyber professionals or can it be leveraged for better Cyber defense? Artificial Intelligence…

publishers-spotlight-elisity
09
Sep
2024

Publishers Spotlight: Elisity – Cyber Defense Magazine

I was thrilled to catch up with Elisity during Black Hat USA 2024. Elisity’s platform makes it easy for IT,…

Headline-Stealing Hacks Involving AI-Based Voice Chatbots & Automated MSPs
09
Sep
2024

Headline-Stealing Hacks Involving AI-Based Voice Chatbots & Automated MSPs

Every new technology trend opens up new attack vectors for cybercriminals. With an ongoing cybersecurity skills shortage, the need for…

Why Legacy MFA is DOA
09
Sep
2024

Why Legacy MFA is DOA

Multi-Factor Authentication (MFA) has long been heralded as a cornerstone of secure digital practices. However, the traditional forms of MFA,…

Best Practices for Enterprise Security
09
Sep
2024

Best Practices for Enterprise Security

Cyberattacks and data breaches are running rampant in enterprises, causing havoc and interrupting business operations. These nuisances are the last…

Combating Pig Butchering Scams and Online Fraud w/ Frank Teruel
05
Sep
2024

Combating Pig Butchering Scams and Online Fraud w/ Frank Teruel

In this interview, we discuss with Frank Teruel, Chief Financial Officer of Arkose Labs, the rise of “pig butchering” scams…

Why Does Data Spillage Happen And What Organizations Can Do About It
04
Sep
2024

Why Does Data Spillage Happen And What Organizations Can Do About It

Data is probably the most critical asset in modern organizations which is why cybercriminals are always on the hunt, attempting to infiltrate and steal information….

Innovator Spotlight: Cobalt
02
Sep
2024

Innovator Spotlight: Cobalt – Cyber Defense Magazine

Pioneering Pentest as a Service (PtaaS) for Enhanced Offensive Security At BlackHat, we had the opportunity to speak with Jason…

Innovator Spotlight: BackBox
02
Sep
2024

Innovator Spotlight: BackBox – Cyber Defense Magazine

Revolutionizing Network Security Automation I recently spoke with Rekha Shenoy, CEO of BackBox during the BlackHat conference, and her insights…

Innovator Spotlight: Delinea
02
Sep
2024

Innovator Spotlight: Delinea – Cyber Defense Magazine

Revolutionizing Identity Security with AI-Driven Solutions At BlackHat 2024, we had the pleasure of discussing the future of identity security…