Category: CyberDefenseMagazine

Why Did Snowflake Have a Target on It? Handling Data Warehouse Security Risks
30
Oct
2024

Why Did Snowflake Have a Target on It? Handling Data Warehouse Security Risks

In early June, the Ticketmaster breach brought widespread attention to the fact that Snowflake accounts did not require multi-factor authentication…

How a CISO Should Brief the Board of Directors
30
Oct
2024

How a CISO Should Brief the Board of Directors

It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply…

ETSI Security Conference 2024 - The Role of Software Bill of Materials w/ dr. Allan Friedman
29
Oct
2024

ETSI Security Conference 2024 – The Role of Software Bill of Materials w/ dr. Allan Friedman

Dr. Allan Friedman is Senior Advisor and Strategist at the Cybersecurity and Infrastructure Security Agency. He coordinates the global cross-sector community…

How a CISO Should Brief the Board of Directors
29
Oct
2024

How a CISO Should Brief the Board of Directors

It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply…

Building Resilience: A Post-Breach Security Strategy for Any Organization
29
Oct
2024

Building Resilience: A Post-Breach Security Strategy for Any Organization

In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to…

innovator-spotlight-cloud-range
29
Oct
2024

Innovator Spotlight: Cloud Range – Cyber Defense Magazine

by Dan K. Anderson CEO, CISO, and vCISO The cybersecurity landscape is rapidly evolving, and so are the tactics of…

How a CISO Should Brief the Board of Directors
28
Oct
2024

How a CISO Should Brief the Board of Directors

It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply…

How Has Video Analytics Enhanced Security and Efficiency?
28
Oct
2024

How Has Video Analytics Enhanced Security and Efficiency?

In recent years, video analytics has significantly transformed the interpretation and utilization of visual data. Through advanced algorithms and artificial…

The Imperative of Penetration Testing AI Systems
28
Oct
2024

The Imperative of Penetration Testing AI Systems

In the modern era of technological advancement, artificial intelligence (AI) is revolutionizing business operations, presenting unparalleled opportunities for efficiency and…

Innovator Spotlight: Legit Security
26
Oct
2024

Innovator Spotlight: Legit Security – Cyber Defense Magazine

by Dan K. Anderson CEO, CISO, and vCISO With the rise of software supply chain attacks, organizations are under increasing…

Safeguarding Corporate Secrets: Best Practices and Advanced Solutions
25
Oct
2024

Safeguarding Corporate Secrets: Best Practices and Advanced Solutions

Do you know where all the secrets are? The probable answer to this might be NO and believe me you…

Cybersecurity and AI: The Future of Digital Defense
25
Oct
2024

Cybersecurity and AI: The Future of Digital Defense

In today’s rapidly evolving digital world, cybersecurity is no longer just an IT issue—it’s a fundamental business-critical concern. As the…