Category: CyberDefenseMagazine

Unlocking the Power of Governance in Cybersecurity: NIST CSF 2.0 Introduces ‘Govern’ to Redefine CISO Leadership in 2024
20
May
2024

Unlocking the Power of Governance in Cybersecurity: NIST CSF 2.0 Introduces ‘Govern’ to Redefine CISO Leadership in 2024

By Shirley Salzman, CEO and Co-Founder, SeeMetrics As all eyes are towards the updated NIST CSF 2.0 publication, some of…

Will We Ever See Federal Data Breaches End Entirely?
16
May
2024

Will We Ever See Federal Data Breaches End Entirely?

Government cybersecurity may get worse before it gets better. By April Miller, Managing Editor, ReHack Magazine Data breaches are a…

Why Is Hardware More Secure than Software?
15
May
2024

Why Is Hardware More Secure than Software?

The underlying differences between hardware and software when implementing critical cryptosystems. By Kimmo Järvinen, Co-founder and CTO, Xiphera The majority…

Three Rules of Crisis Management: Lessons from the War in Israel
14
May
2024

Three Rules of Crisis Management: Lessons from the War in Israel

Crises and challenges are a staple of the technology and cybersecurity industries. While we do our best to plan for…

Rise of the Cyber Supervillain
14
May
2024

Rise of the Cyber Supervillain

By Guy Rosefelt, Chief Product Officer, Sangfor Technologies In my Cyber HotSeat Interview with Gary Miliefsky, I made a prediction…

Cyber resilience: Safeguarding your enterprise in a rapidly changing world
14
May
2024

Cyber resilience: Safeguarding your enterprise in a rapidly changing world

By Srinivasan CR, Executive Vice President-Cloud and Cybersecurity Services & Chief Digital Officer, Tata Communications In a hyperconnected world, cyberattacks…

The Next Generation of Endpoint Security Is Being Reimagined Today
13
May
2024

The Next Generation of Endpoint Security Is Being Reimagined Today

By Vivek Ramachandran, CEO & Founder, SquareX Gone are the days when traditional antivirus solutions were the bulwark of endpoint…

The Importance of Data Categorization In A Threat-Filled Landscape
13
May
2024

The Importance of Data Categorization In A Threat-Filled Landscape

By Dr. Pragyansmita Nayak, Chief Data Scientist, Hitachi Vantara Federal National security is amid a transformative journey driven by technological…

Spike in Layoffs Pose Serious Cybersecurity Concerns
11
May
2024

Spike in Layoffs Pose Serious Cybersecurity Concerns

Different Types of Risk Exposure and Best Practices for Protecting Your Data By Adam Gavish, CEO & Cofounder, DoControl There…

Red Sea Crisis and the Risk of Cyber Fallout
10
May
2024

Red Sea Crisis and the Risk of Cyber Fallout

By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction As Israel’s military campaign in Gaza continues, the United States as a…

Quishing Campaign Exploits Microsoft Open Redirect Vulnerability
09
May
2024

Quishing Campaign Exploits Microsoft Open Redirect Vulnerability

Diving into a new sophisticated campaign, exploiting Microsoft’s Open Redirect vulnerability through quishing By Elad Damari, Incident Response Group Manager,…

Overcoming Common Data Security Challenges
08
May
2024

Overcoming Common Data Security Challenges

By Claude Mandy, Chief Evangelist at Symmetry Systems Organizations depend on data to operate. From day-to-day operations to strategic decisions,…