Category: CyberDefenseMagazine

The AI Arms Race Shaping Federal Cyber Resilience
26
Jun
2024

The AI Arms Race Shaping Federal Cyber Resilience

By Gary Barlet, Federal Chief Technology Officer, Illumio At its core, the paradox of artificial intelligence (AI) in cybersecurity lies…

Get 10x more Visibility across APTs with Red Piranha’s SOC-as-a-Service and Crystal Eye
25
Jun
2024

Get 10x more Visibility across APTs with Red Piranha’s SOC-as-a-Service and Crystal Eye

By Adam Bennett, CEO, Red Piranha Cyberattacks are on the rise and it’s crucial for organizations to have a reliable…

Why every organisation needs a CISO on board
25
Jun
2024

Why every organisation needs a CISO on board

In today’s hyper-interconnected world, managing enterprise digital and technical risk has become a mission-critical priority. But protecting information, people and…

A National Imperative – Cyber Resiliency
22
Jun
2024

A National Imperative – Cyber Resiliency

Strategies to Safeguard Critical Infrastructure Against Cyber Threats By Andrea E. Davis, Founder and President of The Resiliency Initiative I…

How and When to Know You Need a Fractional CISO
22
Jun
2024

How and When to Know You Need a Fractional CISO

By Andy Hilliard, CEO of Accelerance Every business owner knows how important cyber security is. Headlines of attacks, leaks and…

Understanding the Dark Web: What You Need to Know
21
Jun
2024

Understanding the Dark Web: What You Need to Know

Exploring the Dark Web: Essential Insights Revealed By Elena Thomas, Digital Content Strategist, SafeAeon Inc. The internet is like a…

Special Cybersecurity Considerations for Medical and Legal Practices
21
Jun
2024

Special Cybersecurity Considerations for Medical and Legal Practices

“Protect The Most Vulnerable at Their Most Vulnerable Times” By Jim Ford, Founder and CEO, PatientLock® and JurisLock™ In the…

How to Hunt for Volt Typhoon Malware in Critical Infrastructure
20
Jun
2024

How to Hunt for Volt Typhoon Malware in Critical Infrastructure

Hunting for Volt Typhoon, a sophisticated and stealthy cyber threat actor with unknown malware components “living off the land”, is…

Cybersecurity as a Service Market: A Domain of Innumerable Opportunities
19
Jun
2024

Cybersecurity as a Service Market: A Domain of Innumerable Opportunities

Cybersecurity as a Service Market By Aashi Mishra, Content Writer, Research Nester The increased internet usage, all across the globe,…

How Improving EV Charging Infrastructure Can Bolster US Cybersecurity Measures
19
Jun
2024

How Improving EV Charging Infrastructure Can Bolster US Cybersecurity Measures

By Elaina Farnsworth, Co-founder & CEO — SkillFusion The surging popularity of electric vehicles (EVs) is marking a strong push…

Navigating the Perilous Waters of Supply Chain Cybersecurity
18
Jun
2024

Navigating the Perilous Waters of Supply Chain Cybersecurity

By Kenneth Moras Introduction: In today’s interconnected business environment, reliance on innovative vendors and open source solutions is inevitable. However,…

The Challenge of Combatting Threats Against Autonomous Vehicles
18
Jun
2024

The Challenge of Combatting Threats Against Autonomous Vehicles

By Joseph Hladik, Cyber Group Lead, Neya Systems From perception and sensing to mapping and localization, both off-road and on-road…