Category: CyberDefenseMagazine

Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors
08
Feb
2024

Why Cybersecurity Maturity Model Certification (CMMC) Matters for All Businesses, Not Just DoD Contractors

A Vital Set of Cybersecurity Best Practices By John Funk, Creative Consultant, SevenAtoms A new cybersecurity mandate being rolled out…

The Tech Jobs That AI Will Not Disrupt
06
Feb
2024

The Tech Jobs That AI Will Not Disrupt

By Michael Gibbs, CEO — Go Cloud Careers Artificial intelligence is the most exciting innovation to hit the tech world…

A Guide to Affordable Cybersecurity Protection for Your Small Business
06
Feb
2024

A Guide to Affordable Cybersecurity Protection for Your Small Business

There exists an age-old battle between the two sides of the software development industry. On one, there are the white…

3 New Risks That CISOs Will Face in 2024
06
Feb
2024

3 New Risks That CISOs Will Face in 2024

By Daniel Barber, CEO, DataGrail Throughout 2023, data privacy has been front and center in conversations about cybersecurity. Consumers everywhere…

How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance
06
Feb
2024

How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance

Steps To Implement Cyber Controls and Processes By Juliana Spofford, General Counsel and Chief Privacy Officer, Aidentified In today’s tech…

Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments
06
Feb
2024

Closing the Gap: Safeguarding Critical Infrastructure’s IT and OT Environments

By Victor Atkins, Director | Cybersecurity, 1898 & Co. The rise in the age of digitalization has provided numerous benefits…

The Crumbling Castle
04
Feb
2024

The Crumbling Castle – Cyber Defense Magazine

By Jaye Tillson, Director of Strategy, Axis Security In the realm of IT security, the traditional “castle and moat” strategy…

The Cybersecurity Bridge: A Necessary Connection for IT and Communications
04
Feb
2024

The Cybersecurity Bridge: A Necessary Connection for IT and Communications

By Jeff Hahn, principal of Hahn, and Kenneth Holley, Principal and chairman of Silent Quadrant With the increasing unpredictability and…

Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines
04
Feb
2024

Three Things to Know About the New SEC Rules on Sharing Information and Breach Disclosure Deadlines

SEC’s New Guidelines Prompt Proactive Cyber Risk Management By Meghan Maneval, Director of Technical Product Management at RiskOptics Recently, the…

Striking The Right Balance: Cloud and Cyber Priorities for SMEs
04
Feb
2024

Striking The Right Balance: Cloud and Cyber Priorities for SMEs

By Mark Allen, Head of cyber, CloudCoCo As small and medium-sized enterprises (SMEs) embark on their digitalization journey, they face…

Shifting Left Means Shifting Smart: Managing Software Risk With ASPM
02
Feb
2024

Shifting Left Means Shifting Smart: Managing Software Risk With ASPM

By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up…

ETSI Security Conference 2023: Exploring Zero Trust Architecture with Dr. Galina Pildush
02
Feb
2024

Best Practices for Implementing Threat Intelligence in Industrial Control Systems 

It has become clear industrial control systems (ICS) lack essential defenses. In the face of an ever-evolving threat landscape, cyber threat…