Category: CyberDefenseMagazine

Detect and Destroy Cyber Threats with Red Piranha
07
May
2024

Detect and Destroy Cyber Threats with Red Piranha

By Adam Bennett, CEO, Red Piranha Red Piranha is Australia’s leading cybersecurity technology and solutions developer, manufacturer, and official member…

Revolutionizing Cybersecurity Recruitment and Networking: The Cyberr.ai Approach
07
May
2024

Revolutionizing Cybersecurity Recruitment and Networking: The Cyberr.ai Approach

By Laurent Halimi, Founder, Cyberr In the wake of 4 million unfilled cybersecurity positions globally in 2023, conventional hiring practices…

What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform
06
May
2024

What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform

By Tom Tovar, Co-creator and CEO of Appdome There’s a major battle brewing between platform vs. platformization companies in cybersecurity….

Toby Bussa
06
May
2024

Strengthening Cyber Defense with Threat Intelligence Operations

By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more…

Organizational Cybersecurity Hinges on End-User Satisfaction
06
May
2024

Organizational Cybersecurity Hinges on End-User Satisfaction

The critical role end-user experience plays in organizational security By Amitabh Sinha, CEO and Co-Founder of Workspot In an era…

Celebrating our 12th Anniversary at RSA conference 2024
06
May
2024

Celebrating our 12th Anniversary at RSA conference 2024

It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with…

Offensive Awakening: The 2024 Shift from Defensive to Proactive Security
05
May
2024

Offensive Awakening: The 2024 Shift from Defensive to Proactive Security

Adversarial Cyber Exercises Are The New Mandate By Stephen Gates, Principal SME, Horizon3.ai After observing the cyber threat landscape in…

Navigating the Digital Age: AI’s Crucial Role in Cybersecurity Reinforcement
05
May
2024

Navigating the Digital Age: AI’s Crucial Role in Cybersecurity Reinforcement

Harnessing the Power of AI for Advanced Cyber Threat Intelligence and Prevention By Bryan Kissinger, Senior Vice President of Security…

Navigating the API Security Landscape: A CEO’s Perspective on Embedding Zero Trust Principles
04
May
2024

Navigating the API Security Landscape: A CEO’s Perspective on Embedding Zero Trust Principles

By Jyoti Bansal, CEO and Co-Founder, Traceable AI In the dynamic world of digital transformation, I’ve observed a paradigm shift…

Identity Management Challenges
03
May
2024

Identity Management Challenges – Cyber Defense Magazine

By Milica D. Djekic There are a plenty of methods to determine someone’s identity and the most convenient cases are…

Hyperbole, Misinformation, and CyberMonsters Under the Bed
02
May
2024

Hyperbole, Misinformation, and CyberMonsters Under the Bed

By Ken Westin, Field CISO, Panther Labs This week at the World Economic Forum, there was a panel titled “Are…

How SaaS-Based Identity Governance Can Help Future-Proof Your Security
01
May
2024

How SaaS-Based Identity Governance Can Help Future-Proof Your Security

Evaluate your needs and prioritize solutions that offer open integration and independence from the single-vendor trend, ensuring robust IGA that…