Category: CyberDefenseMagazine

Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’
11
Mar
2024

Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’

By Brett Raybould, EMEA Solutions Architect, Menlo Security  Phishing remains one of the most prevalent challenges facing organisations, with more…

The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox
11
Mar
2024

The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox

By Ken Cox, President of Hostirian Despite the technological advancements brought by automation and the enhanced capabilities of data analytics…

The Balancing Act for Mid-Market Firms:  Navigating Digital Growth and Security Hurdles
11
Mar
2024

The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles

By Kevin Beasley, CIO, VAI Increased competition and new regulatory requirements are increasing the tempo of digital transformation among mid-market…

ImmuniWeb AI Platform
11
Mar
2024

ImmuniWeb AI Platform – Cyber Defense Magazine

Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb…

OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft
11
Mar
2024

OT Security Q&A for Cybersecurity Leaders with Difenda and Microsoft

Named Microsoft’s Security Impact Partner of the Year in 2023 for delivering excellence and innovative end-to-end security, Difenda is proud…

Safeguarding the Code That Drives Modern Vehicles
09
Mar
2024

Safeguarding the Code That Drives Modern Vehicles

By Soujanya Ain is a Product Marketing Manager at GitGuardian The automotive landscape has evolved dramatically, from mechanical marvels to…

AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud
07
Mar
2024

AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud

By Tim Ward, Chief Strategy Officer, XConnect Robocalls are relentlessly targeting consumers and causing mistrust for the telecom industry as…

Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack
07
Mar
2024

Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack

By Carl Cadregari, Executive Vice President, FoxPointe Solutions Regardless of the industry in which they operate, organizations have likely witnessed…

Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset
07
Mar
2024

Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset

By John A. Smith, CSO, Conversant Group If data is the new oil, this holds especially true for law firms…

Why the Cloud Is So Vulnerable to Insider Threats
07
Mar
2024

Why the Cloud Is So Vulnerable to Insider Threats

Insider threats are becoming just as big of a threat to cloud security as external threats. Whether accidental or on…

2024 Predictions: The Rise of AI Brings New Security Challenges
05
Mar
2024

2024 Predictions: The Rise of AI Brings New Security Challenges

By Imperva Executives: Karl Triebes, Lebin Cheng, Peter Klimek, Lynn Marks, and Terry Ray The emergence of generative AI has…

SIEM vs XDR: Capabilities and Key Differences
05
Mar
2024

SIEM vs XDR: Capabilities and Key Differences

We compare the differences in SIEM and XDR’s respective contributions to security By Aimei Wei, Chief Technical Officer and Founder,…