Category: CyberDefenseMagazine

Experience from GAP Assessment Audits for NIS2 Compliance
12
Feb
2025

Experience from GAP Assessment Audits for NIS2 Compliance

The NIS2 (Directive (EU) 2022/2555 of the European Parliament and of the Council) imposes cybersecurity and information security compliance obligations…

Building Contextual Data Models for Identity Related Threat Detection & Response (ITDR)
12
Feb
2025

Building Contextual Data Models for Identity Related Threat Detection & Response (ITDR)

Amid the rising pace of digitization, a growing number of organizations are managing their workloads based on a hybrid model….

Incident Response Planning: A Portion of Planning is Worth a Pound of Gold
11
Feb
2025

Incident Response Planning: A Portion of Planning is Worth a Pound of Gold

When you are hacked, you want to recapture control quickly as hackers move through systems, locking sensitive information and holding…

Deepfakes: How Deep Can They Go?
11
Feb
2025

Deepfakes: How Deep Can They Go?

With the help of today’s technology, virtually anyone can create a passable deepfake—a manipulated image, video, or audio recording that…

Is Platform Engineering a Step Towards Better Governed DevOps?
10
Feb
2025

Is Platform Engineering a Step Towards Better Governed DevOps?

Since 2010, Puppet’s annual State of DevOps Report has tracked trends in IT, including security and, more recently, the growth…

Why the Growing Risk of Cyber Inequity Threatens Critical Infrastructure
10
Feb
2025

Why the Growing Risk of Cyber Inequity Threatens Critical Infrastructure

Cyber inequity is a growing chasm that continues to separate organizations with robust cybersecurity and technology capabilities from those without….

How to Root Out Malicious Employees
09
Feb
2025

How to Root Out Malicious Employees

Malicious employees and insider threats pose one of the biggest security risks to organizations, as these users have more access…

Cyber Security in Customer Engagement: The Triple Defence Strategy
09
Feb
2025

Cyber Security in Customer Engagement: The Triple Defence Strategy

As digital interactions dominate modern communication, the rapid evolution of cyber threats demands robust security measures in customer engagement as…

Navigating the New Frontier: Strengthening Cybersecurity Through Next-Gen Identity & Access Governance
08
Feb
2025

Navigating the New Frontier: Strengthening Cybersecurity Through Next-Gen Identity & Access Governance

It can be difficult to fully appreciate just what has changed when it comes to cybersecurity – and by how…

20% of Organizations Have Experienced a Non-Human Identity Security Incident
08
Feb
2025

20% of Organizations Have Experienced a Non-Human Identity Security Incident

Today’s business environment requires teams to do more — better than before, and at a faster rate. Thanks to third-party…

Binary Cryptology with the Internet of Things Communication
08
Feb
2025

Binary Cryptology with the Internet of Things Communication

The home and office-based internet is a quite cheap resource that is everything, but not reliable and trusted as it…

Can Your Security Measures Be Turned Against You?
08
Feb
2025

Can Your Security Measures Be Turned Against You?

Throughout history, the concept of defeating an opponent’s defenses has been central to warfare strategies. From ancient sieges using tunnels…