Category: CyberDefenseMagazine

Innovator Spotlight: Push Security
08
Nov
2024

Innovator Spotlight: Push Security – Cyber Defense Magazine

Identity is the new perimeter. Attackers are no longer hacking into your organization—they’re logging in with compromised credentials. Push Security…

Why SMBs need to reassess the cyber expertise of their service providers
07
Nov
2024

Why SMBs need to reassess the cyber expertise of their service providers

Small and medium-sized business (SMB) are increasingly dependent on managed services providers (MSPs) for their IT needs. In line with this, according to…

Cyber Risks for Government Agencies Are on the Rise. Why Security Is Still an Uphill Battle
07
Nov
2024

Cyber Risks for Government Agencies Are on the Rise. Why Security Is Still an Uphill Battle

State and local government and education organizations (also known as SLED) were always at risk from cyberattacks, but the rise…

Cyber Threat Intelligence (CTI) for Supply Chain Monitoring
06
Nov
2024

Cyber Threat Intelligence (CTI) for Supply Chain Monitoring

Executive summary Many companies face various risks across their supply chain, which are increasing, especially cyber threats. Studies indicate that…

Unlocking the Right Encryption
05
Nov
2024

Unlocking the Right Encryption – Cyber Defense Magazine

The ever-evolving landscape of data security demands constant vigilance, especially for those handling Controlled Unclassified Information (CUI). A presentation by…

Empowering Security Through Timely Nudges: Harnessing Behavioral Science for Real-Time Interventions
05
Nov
2024

Empowering Security Through Timely Nudges: Harnessing Behavioral Science for Real-Time Interventions

Picture this: your colleague’s about to click a link that you know is dodgy. You see it happening from the…

Overcoming Cybersecurity Integration Roadblocks
05
Nov
2024

Overcoming Cybersecurity Integration Roadblocks – Cyber Defense Magazine

As a CEO working alongside cybersecurity product companies, I know that integration & the connectors are necessary evil for cyber…

Strategy Must Adapt
05
Nov
2024

Strategy Must Adapt – Cyber Defense Magazine

The release of iOS 16.4 has been a game-changer for mobile app developers: suddenly, teams can put full-fledged web browser…

Demystifying Zero Trust
05
Nov
2024

Demystifying Zero Trust – Cyber Defense Magazine

What is Zero Trust It was 2010 when term “Zero Trust” was coined by John Kindervag, a thought-leader in Cyber…

How AI Is Transforming Cyber Risk Quantification
05
Nov
2024

How AI Is Transforming Cyber Risk Quantification

Cyber risks differ from other more familiar risks in life, such as the dangers of a car crash for drivers,…

Spotlight on Dashlane
05
Nov
2024

Spotlight on Dashlane – Cyber Defense Magazine

Dashlane is the leading enterprise credential manager that secures access and proactively protects against breaches. In an era where painfully…

Spotlight on Onyxia
05
Nov
2024

Spotlight on Onyxia – Cyber Defense Magazine

Onyxia’s Cybersecurity Management Platform delivers predictive insights and data intelligence that allow CISOs to gain a complete view of their…