Category: CyberDefenseMagazine

Enhancing PCI DSS Compliance: The Urgent Need for Risk-Based Prioritization
17
Feb
2024

Enhancing PCI DSS Compliance: The Urgent Need for Risk-Based Prioritization

By Ian Robinson, Chief Architect of Titania Keeping U.S. commercial critical national infrastructure (CNI) organizations safe is vital to national…

How Businesses Can Manage Cryptocurrency Fraud
17
Feb
2024

How Businesses Can Manage Cryptocurrency Fraud

With cryptocurrency payments on the rise, businesses must learn how to safeguard against potential risks. By James Hunt, Subject Matter…

It’s Time to End the Myth of Untouchable Mainframe Security.
17
Feb
2024

It’s Time to End the Myth of Untouchable Mainframe Security.

By Al Saurette, CEO, MainTegrity, Most large organizations, including 70% of Fortune 500 companies, rely extensively on mainframes for managing…

From the SIEM to the Lake: Bridging the Gap for Splunk Customers Post-Acquisition
17
Feb
2024

From the SIEM to the Lake: Bridging the Gap for Splunk Customers Post-Acquisition

By Omer Singer, VP of Strategy, Anvilogic The smoke has cleared on Cisco’s largest acquisition ever: that of Splunk for…

Cyber Insurance:  A Smart Investment to Protect Your Business from Cyber Threats in 2023
16
Feb
2024

Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023

Don’t wait until it’s too late – get cyber insurance today and secure your business for tomorrow. By Zia Muhammad,…

Cyber Resilience – Beyond Cyber Security
16
Feb
2024

Cyber Resilience – Beyond Cyber Security

In a world where 100% security is not possible, we need to be resilient as we strive to be secure….

an-interview-with-jeffrey-stephens-author
15
Feb
2024

An Interview With Jeffrey Stephens

🔒 Dive into the electrifying world of cyber espionage and the ghost chip with Jeffrey S. Stephens on @CyberDefenseTV! 💻…

Exploring How Vulnerability Puts You at Risk on Valentine’s Day
15
Feb
2024

Exploring How Vulnerability Puts You at Risk on Valentine’s Day

According to Netskope’s latest “Year in Review” Cloud and Threat Report, social engineering was the primary method cyber attackers utilized to infiltrate organizations…

Cybersecurity Preparedness 2024
15
Feb
2024

Cybersecurity Preparedness 2024 – Cyber Defense Magazine

By Chris Leach, Board Advisor for Judy Security The new year is just around the corner.  We have had a…

Digital Technologies Power Global Operations but Present Growing Risks
15
Feb
2024

Digital Technologies Power Global Operations but Present Growing Risks

By Charlie Regan, CEO, Nerds on Site As more and more industries and businesses turn to digital technologies in order…

Evolution and Escalation of Cybersecurity Threats
13
Feb
2024

Evolution and Escalation of Cybersecurity Threats

The Darwinian Effect in the Threat Community By Augusto Barros, Vice President Cyber Security Evangelist at Securonix Among the typical…

SolarWinds Lawsuit Reinforces the Need for Critical Communication Between CISOs and the C-Suite
13
Feb
2024

SolarWinds Lawsuit Reinforces the Need for Critical Communication Between CISOs and the C-Suite

By Jose Seara, Founder and CEO, Denexus As demonstrated by recent developments in the legal matter between SolarWinds and the…