Category: CyberDefenseMagazine

Innovator Spotlight: Sumo Logic
26
Nov
2024

Innovator Spotlight: Sumo Logic – Cyber Defense Magazine

The rapid adoption of cloud and digital services is driving exponential data growth, creating fragmented visibility and operational silos across…

Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations
25
Nov
2024

Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations

In today’s dynamic threat landscape, security leaders are under constant pressure to make informed choices about which solutions and strategies…

Greater Security for Small Businesses: Why Do SMEs Need a SIEM System?
25
Nov
2024

Greater Security for Small Businesses: Why Do SMEs Need a SIEM System?

Recently, the number of cyber attacks has been increasing steadily. It’s important to bear in mind that the more software…

Perimeter Security Is at the Forefront of Industry 4.0 Revolution
24
Nov
2024

Perimeter Security Is at the Forefront of Industry 4.0 Revolution

Perimeter security can be defined as the measures and systems which are deployed in order to protect a physical space…

New Levels, New Devils: The Multifaceted Extortion Tactics Keeping Ransomware Alive
23
Nov
2024

New Levels, New Devils: The Multifaceted Extortion Tactics Keeping Ransomware Alive

Having evolved from a basic premise of locking down a victim’s data with encryption, then demanding a ransom for its…

Navigating the Complexities of AI in Content Creation and Cybersecurity
22
Nov
2024

Navigating the Complexities of AI in Content Creation and Cybersecurity

As AI technology continues to evolve, its integration into various business sectors like content creation is expanding. AI’s capabilities can…

Modern Phishing Challenges and the Browser Security Strategies to Combat Them
21
Nov
2024

Modern Phishing Challenges and the Browser Security Strategies to Combat Them

In today’s landscape of advanced phishing attacks, which leverage legitimate domains and sophisticated tactics to evade traditional security measures, it…

Mitigating the Risk of Cybercrime While Traveling Abroad
20
Nov
2024

Mitigating the Risk of Cybercrime While Traveling Abroad

Global tourism is reaching pre-pandemic records and many people are eager to embark on a new adventure. Yet at the…

ETSI Security Conference 2024 - Identity Theft in the Digital Age w/ Dr. Nicole van der Meulen
19
Nov
2024

ETSI Security Conference 2024 – Identity Theft in the Digital Age w/ Dr. Nicole van der Meulen

Nicole van der Meulen is cybersecurity innovation lead at SURF. Previously she worked as a Senior Strategic Analyst and Head of…

Maintaining File Security While Working Remotely
19
Nov
2024

Maintaining File Security While Working Remotely

These days remote workers in home offices using residential WiFi must maintain a similar security posture as a full-on corporation…

Illegal Crypto Mining: How Businesses Can Prevent Themselves From Being ‘Cryptojacked’
18
Nov
2024

Illegal Crypto Mining: How Businesses Can Prevent Themselves From Being ‘Cryptojacked’

The popularity of cryptocurrencies like Ethereum and Bitcoin surged during the pandemic era. What began as a niche, almost novelty…

How Ransomware Jeopardizes Healthcare Organizations
17
Nov
2024

How Ransomware Jeopardizes Healthcare Organizations

Security challenges in the healthcare sector continue to grow as connected assets and attack surfaces expand. Organizations in any sector…