Category: CyberDefenseMagazine

How to Use AI in Cyber Deception
19
Jan
2025

How to Use AI in Cyber Deception

For years, cyber deception has been an excellent tool against would-be cybercriminals. However, the cybersecurity landscape is constantly evolving —…

How To Privacy-Proof the Coming AI Wave
19
Jan
2025

How To Privacy-Proof the Coming AI Wave

Everyone has noticed that we have entered the AI era. AI is everywhere: to improve customer experience, reduce costs, generate…

How To Fight Scattered Spider Impersonating Calls to The IT Help Desk
18
Jan
2025

How To Fight Scattered Spider Impersonating Calls to The IT Help Desk

Imagine you worked for years on building your cyber defense. You built all the systems you need, all the policies…

How Government Agencies Can Level the Cybersecurity Playing Field With AI/ML
18
Jan
2025

How Government Agencies Can Level the Cybersecurity Playing Field With AI/ML

The threat cybercriminals pose to federal information systems and networks is real and pervasive. Defending against unauthorized intrusions is a…

Growing Enterprise Data is Creating Big Cybersecurity Risk
17
Jan
2025

Growing Enterprise Data is Creating Big Cybersecurity Risk

Buzz about big data permeated tech conversations in the mid-1990s, but people today don’t talk as much about big data…

Exploring the Vishing Threat Landscape
17
Jan
2025

Exploring the Vishing Threat Landscape

Voice phishing, also known as vishing, represents a growing threat to organizations worldwide. Keepnet’s 2024 Vishing Response Report illuminates the…

Print Friendly, PDF & Email
17
Jan
2025

Enhancing Security Beyond Multi-Factor Authentication in the Age of Token Impersonation Attacks –

For over a decade, multi-factor authentication (MFA) has been a cornerstone of online security policies. However, as cyber threats evolve…

Cybersecurity: How to Involve People in Risk Mitigation
16
Jan
2025

Cybersecurity: How to Involve People in Risk Mitigation

Cybersecurity: how to involve people in risk mitigation Cefriel presented the white paper “Cyber Security and the Human Element”, an…

RSA Conference: 20th annual RSAC Innovation Sandbox and fifth annual Launch Pad contests are now open.
15
Jan
2025

RSA Conference: 20th annual RSAC Innovation Sandbox and fifth annual Launch Pad contests are now open.

San Francisco, CA – January 14, 2025 – RSA Conference™, the world’s leading information security conferences and expositions, today announced that submissions…

The Advent of Quantum Cryptography and Zero Trust: A New Era In The World Of Cybersecurity
15
Jan
2025

The Advent of Quantum Cryptography and Zero Trust: A New Era In The World Of Cybersecurity

Short description The advancement of cybersecurity is propelled by adapting to new technologies and rising threats. From quantum cryptography to…

Exposure Management: A Strategic Approach to Cyber Security Resource Constraint
15
Jan
2025

Exposure Management: A Strategic Approach to Cyber Security Resource Constraint

Imagine being bombarded by a relentless barrage of alarms, each one clamouring for immediate attention. This is the daily reality…

Publisher’s Spotlight: Merlin Group
14
Jan
2025

Publisher’s Spotlight: Merlin Group – Cyber Defense Magazine

Bridging the Gap Between Cyber Innovation and Regulated Markets Addressing the Challenge of Innovation Access in Regulated Markets In an…