Category: CyberDefenseMagazine

Cyber Risks Associated with Adoption of Generative AI Tools
18
Apr
2025

Cyber Risks Associated with Adoption of Generative AI Tools

As artificial intelligence (AI) continues to revolutionize the business landscape, midsized organizations find themselves at a crossroads, balancing the transformative…

Publisher’s Spotlight: Veriti
17
Apr
2025

Publisher’s Spotlight: Veriti – Cyber Defense Magazine

By Gary S. Miliefsky, Publisher, Cyber Defense Magazine Transforming Exposure Management with Safe, Automated Remediation Organizations today invest heavily in…

BREAKING: CISA Steps In to Keep CVE Services Alive
17
Apr
2025

BREAKING: CISA Steps In to Keep CVE Services Alive

By Gary Miliefsky, Publisher, Cyber Defense Magazine Good news comes to us like a Windows patch Tuesday: Common Vulnerabilities and…

The Looming Shadow Over AI: Securing the Future of Large Language Models
16
Apr
2025

The Looming Shadow Over AI: Securing the Future of Large Language Models

These days Large Language Models (LLMs) are nothing short of revolutionary, though they have been around since 1996 (ELIZA, developed…

Understanding the 2025 HIPAA Security Rule Updates: A Comprehensive Analysis of Healthcare Cybersecurity Enhancements
16
Apr
2025

Understanding the 2025 HIPAA Security Rule Updates: A Comprehensive Analysis of Healthcare Cybersecurity Enhancements

Introduction The evolving landscape of healthcare cybersecurity is undergoing a major transformation with the Department of Health and Human Services’…

MITRE CVE Program in Jeopardy
16
Apr
2025

MITRE CVE Program in Jeopardy

As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for…

Publisher’s Spotlight: Industrial Defender
16
Apr
2025

Publisher’s Spotlight: Industrial Defender – Cyber Defense Magazine

By Gary S. Miliefsky, Publisher, Cyber Defense Magazine In today’s hyperconnected world, protecting critical infrastructure has become a national imperative….

Unified Endpoint Management: One Tool to Rule All
15
Apr
2025

Unified Endpoint Management: One Tool to Rule All

As the number of endpoint devices increases, managing and securing them becomes complex. The traditional way of using separate security…

Why Securing Prompts Will Never Be Enough: The GitHub Copilot Case
15
Apr
2025

Why Securing Prompts Will Never Be Enough: The GitHub Copilot Case

We’ve spent months analyzing how AI-powered coding assistants like GitHub Copilot handle security risks. The results? Disturbing. The Hidden Risks…

Print Friendly, PDF & Email
15
Apr
2025

Is your edge and border defence tech vulnerable, and what to do about it

Following a number of recent high-profile events, edge and border defence technologies such as firewalls, VPN gateways and intrusion prevention…

Trusted & Resilient Saas Data Is Essential for Successful Agentic AI Within Government Agencies
14
Apr
2025

Trusted & Resilient Saas Data Is Essential for Successful Agentic AI Within Government Agencies

Government agencies are under immense pressure to modernize, both from the legislature and constituents demanding a digital-first experience. Advances in…

Training Skillset Transfer
14
Apr
2025

Training Skillset Transfer – Cyber Defense Magazine

Understanding Skills and Their Importance A skill is an individual’s ability to perform an action efficiently and effectively, providing a…