Category: CyberDefenseMagazine

In Pursuit of a Passwordless Future
28
Jan
2024

In Pursuit of a Passwordless Future

By Rob Jenks, Senior Vice President of Corporate Strategy, Tanium  Many computer users dream of a day when the industry…

Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT
28
Jan
2024

Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT

By Dr. Torsten Staab, PhD, RTX Principal Technical Fellow From September 5th to September 8th of 2023, Billington Cybersecurity hosted…

It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence
28
Jan
2024

It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence

By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware…

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity
28
Jan
2024

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity

By Jeremy Butteriss, EGM Ecosystem and Partnerships, Xero An iconic moment in the rise of ecosystems was Steve Ballmer on…

Developers Hold the New Crown Jewels. Are They Properly Protected?
26
Jan
2024

Developers Hold the New Crown Jewels. Are They Properly Protected?

By Aaron Bray, CEO. Phylum Cybersecurity has changed dramatically in the last four years. During the pandemic, organizations around the…

Expect to Fail: How Organizations Can Benefit from a Breach
26
Jan
2024

Expect to Fail: How Organizations Can Benefit from a Breach

By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions…

How to Create a Threat Hunting Program for Your Business
26
Jan
2024

How to Create a Threat Hunting Program for Your Business

By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s…

How To Improve Security Capacities of The Internet of Things?
26
Jan
2024

How To Improve Security Capacities of The Internet of Things?

By Milica D. Djekic The security of the Internet of Things (IoT) is one of the main challenges of today….

Cybersecurity in Digital Afterlife
24
Jan
2024

Cybersecurity in Digital Afterlife – Cyber Defense Magazine

Managing cybersecurity risks in digital afterlife By Chahak Mittal, GRC Manager, Universal Logistics The concept of the digital afterlife is…

When the Enemy Is DDoS, Holistic Protection Is a Must
24
Jan
2024

When the Enemy Is DDoS, Holistic Protection Is a Must

An infinite variety of attack methods require customizable solutions. By Sean Newman, VP/Product Management, Corero Sun Tzu was an exceptional…

keeping saas data under wraps
24
Jan
2024

Keeping SaaS Data Under Wraps

A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business…

Data Sanitization for End-Of-Use Assets
24
Jan
2024

Data Sanitization for End-Of-Use Assets

Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe…