Category: CyberDefenseMagazine

Ransom-War Escalation: The New Frontline in Cyber Warfare
23
Feb
2024

Ransom-War Escalation: The New Frontline in Cyber Warfare

By Nissim Ben Saadon, Director of Innovation, CYREBRO High-profile ransomware attacks against government targets in Costa Rica and Peru last…

Reducing Burnout and Increasing SOC Retention: How Leaders Can Improve Their Employees’ Lives and Improve Security
23
Feb
2024

Reducing Burnout and Increasing SOC Retention: How Leaders Can Improve Their Employees’ Lives and Improve Security

By Kayla Williams, CISO, Devo The significant skills gap and burnout of current personnel are two of the most frequent…

From Virtual Visions to Tangible Profits: A Founder’s Guide to Launching a vCISO Firm in 2024
22
Feb
2024

From Virtual Visions to Tangible Profits: A Founder’s Guide to Launching a vCISO Firm in 2024

By Caroline McCaffrey, CEO and Co-founder, ClearOPS Most people find themselves in cybersecurity because they find its ever-changing landscape interesting….

5 Cybersecurity Predictions and Trends to Watch in 2024
22
Feb
2024

5 Cybersecurity Predictions and Trends to Watch in 2024

Radware’s cybersecurity experts offer insights into the 2024 threat landscape. From the profound influence of AI and the intricacies of…

Getting AI Right for Security: 5 Principles
22
Feb
2024

Getting AI Right for Security: 5 Principles

By Kevin Kennedy, SVP Products, Vectra AI Now more than ever, companies need effective security solutions. The cost of global…

VPNs in Times of War: Why a Rise in Global Conflicts Mean Citizens Now Need VPNs More Than Ever
22
Feb
2024

VPNs in Times of War: Why a Rise in Global Conflicts Mean Citizens Now Need VPNs More Than Ever

A NEW era of global instability is dawning. By Sebastian Schaub, CEO, hide.me Russia’s ongoing invasion of Ukraine continues to…

Four Ways Genai Will Change the Contours Of The Corporate Landscape In 2024
22
Feb
2024

Four Ways Genai Will Change the Contours Of The Corporate Landscape In 2024

By Neil Serebryany, CEO and Founder of CalypsoAI Generative artificial intelligence (GenAI) models, including large language models (LLMs) have been…

Hyperautomation: Revolutionizing the Security Market
22
Feb
2024

Hyperautomation: Revolutionizing the Security Market

By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research and Media Private Limited) Hyperautomation: Revolutionizing the Security…

How The Security of The Cloud’s Supply Chain Will Shift in 2024
21
Feb
2024

How The Security of The Cloud’s Supply Chain Will Shift in 2024

What we can expect from advanced threat actor groups in the new year. By Jason Martin, Co-founder and Co-CEO at…

New Year, New Consumer Demands in Cybersecurity: Navigating the Landscape of Consumer Expectations and App Developer Responsibility in Mobile App Security
21
Feb
2024

New Year, New Consumer Demands in Cybersecurity: Navigating the Landscape of Consumer Expectations and App Developer Responsibility in Mobile App Security

By Alan Bavosa, VP of Security Products, Appdome The significant growth and mass adoption of mobile applications has completely transformed…

Building a Better Perimeter Defense Strategy to Meet the Challenges of 2024
21
Feb
2024

Building a Better Perimeter Defense Strategy to Meet the Challenges of 2024

By Yiyi Miao, Chief Product Officer, OPSWAT In the ever-changing domain of cybersecurity, organizations continue to face multifaceted challenges with…

Unlocking Security: A Deep Dive into Zero-Trust Architecture
21
Feb
2024

Unlocking Security: A Deep Dive into Zero-Trust Architecture

Tom Madsen’s upcoming book, “Zero-trust – An Introduction,” offers readers a comprehensive guide to implementing and managing a zero-trust architecture…