Category: CyberDefenseMagazine

The Challenge of Combatting Threats Against Autonomous Vehicles
18
Jun
2024

The Challenge of Combatting Threats Against Autonomous Vehicles

By Joseph Hladik, Cyber Group Lead, Neya Systems From perception and sensing to mapping and localization, both off-road and on-road…

Should you be implementing a CTEM strategy?
18
Jun
2024

Should you be implementing a CTEM strategy?

Many organisations struggle to remediate their vulnerabilities and this is not surprising when you consider that we’ve seen a 25% year-on-year growth in critical…

Emerging Technology Review and Needs
17
Jun
2024

Emerging Technology Review and Needs

By Milica D. Djekic The progress distribution is a slow and time-consuming process that normally might take decades and sometimes…

Spotlight on Scribe Security
17
Jun
2024

Spotlight on Scribe Security – Cyber Defense Magazine

By Dan K. Anderson vCISO and On-Call Roving Reporter, Cyber Defense Magazine In my travels and works one of the…

Combating Cyber-attacks with Threat-Intelligence
16
Jun
2024

Combating Cyber-attacks with Threat-Intelligence – Cyber Defense Magazine

Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By…

Mastering the Art of Digital Management: Potential Risks and Business Best Practices
16
Jun
2024

Mastering the Art of Digital Management: Potential Risks and Business Best Practices

By Allison Raley, Partner, Arnall Golden Gregory Cryptocurrency has opened unprecedented opportunities for businesses to streamline transactions across global markets,…

How to Design a Zero Trust Strategy for Remote Workers
15
Jun
2024

How to Design a Zero Trust Strategy for Remote Workers

By Federico Charosky, Founder and CEO, Quorum Cyber The modern workforce expects to work anywhere from any device. To support…

The TikTok Ban Spells Trouble for Chinese IoT
15
Jun
2024

The TikTok Ban Spells Trouble for Chinese IoT

What businesses should do today to prepare for likely bans across Chinese tech tomorrow By Carsten Rhod Gregersen, Founder and…

AI Can Bridge the Gap of Ineffective MDR Tools
14
Jun
2024

AI Can Bridge the Gap of Ineffective MDR Tools

By Orion Cassetto, Head of Marketing, Radiant Security Last year, nearly one-third of organizations suffered breaches, prompting security professionals to…

The “Non-Trend” of “Full Automation” Workflows in Cybersecurity: A Reality Check
13
Jun
2024

The “Non-Trend” of “Full Automation” Workflows in Cybersecurity: A Reality Check

By Oren Koren, CPO & Co-Founder of VERITI It’s no surprise that there’s been a shift to automated workflows in…

<strong>Cyber Risk Management Scorecard for US Courts</strong>
12
Jun
2024

Cyber Risk Management Scorecard for US Courts

Cybercriminals continue to attack enterprises and federal and state institutions by using sophisticated tools and adopting new breaching methods. Global…

A Closer Look at Recent Changes to New York State Department of Financial Services (NYSDFS) Cybersecurity Regulation
12
Jun
2024

A Closer Look at Recent Changes to New York State Department of Financial Services (NYSDFS) Cybersecurity Regulation

By Christopher Salone, Consulting Manager at FoxPointe Solutions Most changes to The New York State Department of Financial Services (NYSDFS)…