Category: CyberDefenseMagazine

going beyond authentication
19
Feb
2025

Going Beyond Authentication – Cyber Security Magazine

User Authentication B2C by Kimberly Biddings, VP of Product, BIO-key International As companies look for multi-factor authentication (MFA) methods to…

How to Plan a Virtual Training Program?
19
Feb
2025

How to Plan a Virtual Training Program?

Virtual training is a type of training that allows employees to learn and train from a remote location. Employees can…

Print Friendly, PDF & Email
19
Feb
2025

Strengthening Financial Services with Third-Party Risk Mitigation Strategies

In a global economy that is becoming increasingly interconnected through various technologies, financial institutions rely on third-party companies for vital…

The CISO’s Myopia
17
Feb
2025

The CISO’s Myopia – Cyber Defense Magazine

Fifteen years ago, I wrote an article entitled “The CSO’s Myopia.” At the time, I aimed to highlight a critical…

The Multi-Layer Complexity of Cybersecurity for The Automotive Supply Chain
16
Feb
2025

The Multi-Layer Complexity of Cybersecurity for The Automotive Supply Chain

Thousands and thousands of components go into the assembly of contemporary vehicles. It is impossible for any original equipment manufacturer…

How Amazon Prime Day Scams Are Getting Smarter and How Can You Protect Yourself
16
Feb
2025

How Amazon Prime Day Scams Are Getting Smarter and How Can You Protect Yourself

Amazon Prime Day has become a major shopping event, with 2023 setting a record as customers purchased over 375 million…

Complexity: The Silent Killer of Cybersecurity
15
Feb
2025

Complexity: The Silent Killer of Cybersecurity

The cybersecurity landscape is a complex and ever-evolving ecosystem. At its core lies a fundamental paradox: the more tools we…

Confronting the Ransomware Menace: A Critical Look at Payment Practices and Emerging Strategies
15
Feb
2025

Confronting the Ransomware Menace: A Critical Look at Payment Practices and Emerging Strategies

Ransomware attacks remain a significant threat to organizations worldwide, with cybercriminals continuously evolving tactics. Despite long-standing advice from cybersecurity experts…

Why EPSS is a Game-Changer for Cybersecurity Risk Management
14
Feb
2025

Why EPSS is a Game-Changer for Cybersecurity Risk Management

Having served on the MITRE.org CVE (OVAL) advisory board, I have spent years analyzing vulnerabilities and how they impact global…

Maximizing Security Through Hardware
14
Feb
2025

Maximizing Security Through Hardware – Cyber Defense Magazine

Organizations are continually balancing seamless user experiences and implementing robust defenses against evolving threats. Passwords, as the first line of…

Have the Last Word Against Ransomware with Immutable Backup
14
Feb
2025

Have the Last Word Against Ransomware with Immutable Backup

With incidences of ransomware on the rise, nobody should even be thinking that an attack is something that couldn’t happen…

Publishers Spotlight: Flashpoint
13
Feb
2025

Publishers Spotlight: Flashpoint – Cyber Defense Magazine

In 2024, a new hybrid cold war is redefining the threat landscape. Cyber, physical, and geopolitical risks are converging, with…