Category: CyberDefenseMagazine

Your Alerts Are Increasing Your Cybersecurity Risk
13
Oct
2025

Your Alerts Are Increasing Your Cybersecurity Risk

At their core, alerts exist to bring attention to something meaningful: an indicator of compromise (IOC), an indicator of attack…

AI vs AI: The Future of Cybersecurity Is Machine vs. Machine. Is the human factor still relevant?
13
Oct
2025

AI vs AI: The Future of Cybersecurity Is Machine vs. Machine. Is the human factor still relevant?

How Artificial Intelligence is transforming both cyber defense and cybercrime by Venkatesh Apsingekar, Senior Engineering Manager – Illumio I recently…

Is Hacking Back Ever a Good Strategy?
13
Oct
2025

Is Hacking Back Ever a Good Strategy?

Hacking back aims to retaliate against cyberattackers by launching a counterattack to disrupt their systems, recover stolen data or send…

Print Friendly, PDF & Email
13
Oct
2025

Securing IoT Foundations: Building Resilient Networks for Smart Healthcare Systems

The Internet of Things (IoT) has transformed healthcare by enabling smart systems that improve patient care, streamline operations, and facilitate…

Is CMMC 3.0 on the Horizon? How Defense Contractors Can Prepare Now
12
Oct
2025

Is CMMC 3.0 on the Horizon? How Defense Contractors Can Prepare Now

The Department of Defense recently sent defense contractors a clear signal: an update to the recently finalized CMMC 2.0 is…

In Defense of Good Bots: Good Bots Exist, But Only When We Build Them That Way
12
Oct
2025

In Defense of Good Bots: Good Bots Exist, But Only When We Build Them That Way

The word “bot” doesn’t have the best reputation right now. You hear it and think of election manipulation, fake social…

Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM)
11
Oct
2025

Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM)

In today’s cybersecurity landscape, identity is no longer just a credentialing concern; it is the battleground. Modern cyber defenses increasingly…

How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics
10
Oct
2025

How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics

Cyberattacks are becoming increasingly complex because organizations are more interconnected than ever before while threat actors are better resourced and…

Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies
10
Oct
2025

Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies

The emergence of AI represents a workplace revolution, transforming virtually every industry and reshaping the daily experiences and responsibilities of…

Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025
10
Oct
2025

Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025

There has been an increase in the advent of cyberattacks like never before. The companies are adopting cloud computing, AI-driven…

Print Friendly, PDF & Email
08
Oct
2025

IEC 62443: A Cybersecurity Guide for Industrial Systems (Part 4)

Welcome back to the series on the IEC 62443 standard for industrial cybersecurity. This third installment will investigate the documents…

Breaking Point: Storage & Backup Systems
07
Oct
2025

Breaking Point: Storage & Backup Systems

Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems Enterprise storage and backup systems have become a high-priority…