Category: CyberDefenseMagazine

Be prepared: the 3 top cyberthreats for 2024
08
Feb
2024

Be prepared: the 3 top cyberthreats for 2024

In today’s fast-evolving cybersecurity environment, being aware of upcoming threats on the horizon is crucial for informing the preparations and…

Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game
08
Feb
2024

Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game

If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure…

AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users
08
Feb
2024

AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users

Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at…

AI: The Human Touch in Cybersecurity Recruitment
08
Feb
2024

AI: The Human Touch in Cybersecurity Recruitment

Harnessing the Digital Scout for Cybersecurity’s Future By Darrin Straff, Senior Staffing Consultant, NinjaJobs Introduction: In the digital age, where…

Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors
08
Feb
2024

Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors

A Vital Set of Cybersecurity Best Practices By John Funk, Creative Consultant, SevenAtoms A new cybersecurity mandate being rolled out…

The Tech Jobs That AI Will Not Disrupt
06
Feb
2024

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world…

A Guide to Affordable Cybersecurity Protection for Your Small Business
06
Feb
2024

A Guide to Affordable Cybersecurity Protection for Your Small Business

There exists an age-old battle between the two sides of the software development industry. On one, there are the white…

3 New Risks That CISOs Will Face in 2024
06
Feb
2024

3 New Risks That CISOs Will Face in 2024

By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere…

How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance
06
Feb
2024

How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance

Steps To Implement Cyber Controls and Processes By Juliana Spofford, General Counsel and Chief Privacy Officer, Aidentified In today’s tech…

Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments
06
Feb
2024

Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments

By Victor Atkins, Director | Cybersecurity, 1898 & Co. The rise in the age of digitalization has provided numerous benefits…

The Crumbling Castle
04
Feb
2024

The Crumbling Castle – Cyber Defense Magazine

By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy…

The Cybersecurity Bridge: A Necessary Connection for IT and Communications
04
Feb
2024

The Cybersecurity Bridge: A Necessary Connection for IT and Communications

By Jeff Hahn, principal of Hahn, and Kenneth Holley, Principal and chairman of Silent Quadrant With the increasing unpredictability and…