Category: CyberDefenseMagazine

Stop Managing Identities, Segment them Instead
29
Apr
2024

Stop Managing Identities, Segment them Instead

By Sagie Dulce, VP Research, Zero Networks A Brief History of Identity Management  For as long as there have been…

Good Security Is About Iteration, Not Perfection.
28
Apr
2024

Good Security Is About Iteration, Not Perfection.

By Craig Burland, CISO, Inversion6 In the dynamic and unpredictable realm of cybersecurity, striving for perfect solutions can be a…

GitGuardian Researchers Find Thousands of Leaked Secrets in PyPI (Python Package Index) Packages
27
Apr
2024

GitGuardian Researchers Find Thousands of Leaked Secrets in PyPI (Python Package Index) Packages

By Dwayne McDaniel, GitGuardian Developer and Security Advocate, GitGuardian The modern world of DevOps means relying on our code connecting…

Enhancing Cybersecurity Defenses: The role of Voice Cloning in Penetration Testing
26
Apr
2024

Enhancing Cybersecurity Defenses: The role of Voice Cloning in Penetration Testing

By Alex Serdiuk, CEO, Respeecher Newer and more impactful technological advancements are making the quest for foolproof cybersecurity measures more…

Data Breach Search Engines
25
Apr
2024

Data Breach Search Engines – Cyber Defense Magazine

Navigating Access and Security in the Stolen Credentials Landscape By Tom Caliendo, Cybersecurity Reporter, Co-Founder at Brocket Consulting LLC In…

UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know
24
Apr
2024

UnitedHealth Group Pays Ransom After Cyberattack: What You Need to Know

In an alarming revelation, officials from the Minnesota-based UnitedHealth Group disclosed on Monday that the health insurance and services giant…

Cybersecurity Trends and Predictions for 2024
24
Apr
2024

Cybersecurity Trends and Predictions for 2024

By Nick France, CTO at Cybersecurity Leader Sectigo Given the fact that bad actors are always on the prowl, 2024…

AI is Revolutionizing Phishing for Both Sides. What will make the Difference?
23
Apr
2024

AI is Revolutionizing Phishing for Both Sides. What will make the Difference?

Thanks to AI, phishing attacks are better than ever. So is our ability to stop them. By Antonio Sanchez, Principal…

Crafting AI’s Future: Decoding the AI Executive Order
22
Apr
2024

Crafting AI’s Future: Decoding the AI Executive Order

By: Rajat Kohli, Partner at Zinnov There is something to be learned from epic fantasy productions like Harry Potter. That…

Weighing Down Cyberrisk Options: How to Make Objective Cybersecurity Decisions Without Negatively Impacting the Organization’s IT Teams?
21
Apr
2024

Weighing Down Cyberrisk Options: How to Make Objective Cybersecurity Decisions Without Negatively Impacting the Organization’s IT Teams?

By Mike Starr, CEO of Trackd It’s often paid lip service to (or worse, intentionally neglected), and rarely appreciated, but…

Connecting Tech to Black America
20
Apr
2024

Connecting Tech to Black America

By David Lee, Chief Evangelist and Visionary for Tech Diversity As technology rapidly evolves and advances, it can often seem…

The Importance of Cyber Hygiene for Businesses
19
Apr
2024

The Importance of Cyber Hygiene for Businesses

By Rigo Van den Broeck, Executive Vice President, Cyber Security Product Innovation at Mastercard Cybercrime is set to cost $10.3…