Category: CyberDefenseMagazine

The Role of Identity Data Management in Achieving CISA’S Strategic Goals
09
Apr
2024

The Role of Identity Data Management in Achieving CISA’S Strategic Goals

By Wade Ellery, Field Chief Technology Officer at Radiant Logic Cyber threats such as ransomware, zero-day exploits, phishing and supply…

The Quantum Shift
08
Apr
2024

The Quantum Shift – Cyber Defense Magazine

Preparing Cybersecurity for a New Era By Sercan Okur, VP of Technology, NextRay In contrast to my previous pieces, I…

Zero Trust Access: The Transformative Blueprint for Achieving Regulatory Compliance
08
Apr
2024

Zero Trust Access: The Transformative Blueprint for Achieving Regulatory Compliance

Ironclad compliance through the Zero Trust innovation mindset By Roy Kikuchi, Director of Strategic Alliances at Safous, Internet Initiative Japan…

The Pitfalls of Periodic Penetration Testing & What to Do Instead
08
Apr
2024

The Pitfalls of Periodic Penetration Testing & What to Do Instead

Periodic penetration testing approaches can be likened to regular tire inspections for vehicles. While they provide valuable insights into the…

The Case Study: The Exploitation of Mechatronics Systems
07
Apr
2024

The Case Study: The Exploitation of Mechatronics Systems

By Milica D. Djekic The mechatronics systems are a common part of the industrial control systems (ICS) or – in…

Strengthening Financial Services: Embracing the Digital Operational Resilience Act (DORA) for Cybersecurity Resilience
07
Apr
2024

Strengthening Financial Services: Embracing the Digital Operational Resilience Act (DORA) for Cybersecurity Resilience

By Boris Khazin, Head of Governance, Risk & Compliance at EPAM Systems, Inc. While concerns about market volatility, liquidity management…

Speaking Cyber-Truth: The CISO’s Critical Role in Influencing Reluctant Leadership
06
Apr
2024

Speaking Cyber-Truth: The CISO’s Critical Role in Influencing Reluctant Leadership

By Craig Burland, CISO, Inversion6 In the C-Suites and boardrooms of modern enterprises, there’s an unwelcome guest that often disrupts…

SASE and Zero Trust: A Powerful Combination
05
Apr
2024

SASE and Zero Trust: A Powerful Combination

By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Gone are the days when network security resembled a medieval castle. It…

Government Communications: The Threats
05
Apr
2024

Government Communications: The Threats – Cyber Defense Magazine

By Nicole Allen, Marketing Manager at Salt Communications In an age where information flows freely and rapidly, government communications have…

A 5-Minute Refresher to Cryptography
04
Apr
2024

A 5-Minute Refresher to Cryptography

 (featuring Alice and Bob) by Rajvi Shroff It’s an age-old question. Alice wants to send a message to Bob. But…

Print Friendly, PDF & Email
04
Apr
2024

Ransomware Threats and Data Protection Strategies

In our interview with Purandar Das, CEO and Co-founder of Sotero, we delved into the pressing issue of ransomware threats…

Smart Traffic Signals Security in the Era of AI and Smart Cars
03
Apr
2024

Smart Traffic Signals Security in the Era of AI and Smart Cars

Analyzing the Trade-off Between Efficiency and Security in Smart Traffic Signal Technology Integration. by Samridhi Agarwal, Masters Student, CMU Once…