Category: CyberDefenseMagazine
By Wade Ellery, Field Chief Technology Officer at Radiant Logic Cyber threats such as ransomware, zero-day exploits, phishing and supply…
Preparing Cybersecurity for a New Era By Sercan Okur, VP of Technology, NextRay In contrast to my previous pieces, I…
Ironclad compliance through the Zero Trust innovation mindset By Roy Kikuchi, Director of Strategic Alliances at Safous, Internet Initiative Japan…
Periodic penetration testing approaches can be likened to regular tire inspections for vehicles. While they provide valuable insights into the…
By Milica D. Djekic The mechatronics systems are a common part of the industrial control systems (ICS) or – in…
By Boris Khazin, Head of Governance, Risk & Compliance at EPAM Systems, Inc. While concerns about market volatility, liquidity management…
By Craig Burland, CISO, Inversion6 In the C-Suites and boardrooms of modern enterprises, there’s an unwelcome guest that often disrupts…
By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Gone are the days when network security resembled a medieval castle. It…
By Nicole Allen, Marketing Manager at Salt Communications In an age where information flows freely and rapidly, government communications have…
(featuring Alice and Bob) by Rajvi Shroff It’s an age-old question. Alice wants to send a message to Bob. But…
In our interview with Purandar Das, CEO and Co-founder of Sotero, we delved into the pressing issue of ransomware threats…
Analyzing the Trade-off Between Efficiency and Security in Smart Traffic Signal Technology Integration. by Samridhi Agarwal, Masters Student, CMU Once…