Category: CyberDefenseMagazine

Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM)
11
Oct
2025

Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM)

In today’s cybersecurity landscape, identity is no longer just a credentialing concern; it is the battleground. Modern cyber defenses increasingly…

How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics
10
Oct
2025

How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics

Cyberattacks are becoming increasingly complex because organizations are more interconnected than ever before while threat actors are better resourced and…

Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies
10
Oct
2025

Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies

The emergence of AI represents a workplace revolution, transforming virtually every industry and reshaping the daily experiences and responsibilities of…

Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025
10
Oct
2025

Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025

There has been an increase in the advent of cyberattacks like never before. The companies are adopting cloud computing, AI-driven…

Print Friendly, PDF & Email
08
Oct
2025

IEC 62443: A Cybersecurity Guide for Industrial Systems (Part 4)

Welcome back to the series on the IEC 62443 standard for industrial cybersecurity. This third installment will investigate the documents…

Breaking Point: Storage & Backup Systems
07
Oct
2025

Breaking Point: Storage & Backup Systems

Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems Enterprise storage and backup systems have become a high-priority…

How Can IT Security Professionals Best Navigate the CMMC Maze?
07
Oct
2025

How Can IT Security Professionals Best Navigate the CMMC Maze?

For companies still treating the Cybersecurity Maturity Model Certification (CMMC) as an IT-only concern, the risks are growing. Developed by…

What Security Teams Are Looking for in Identity Management Today
06
Oct
2025

What Security Teams Are Looking for in Identity Management Today

Identity management gives organizations better visibility and control over their identity infrastructure – if they use the right approach. Well…

Print Friendly, PDF & Email
06
Oct
2025

ETSI Security Conference 2025 – Insights into the Global Cybersecurity Landscape with NCSC’s Ollie Whitehouse

At the ETSI Security Conference 2025, we spoke with Ollie Whitehouse, Chief Technical Officer at the UK’s National Cyber Security…

Innovator Spotlight: Singulr AI
03
Oct
2025

Innovator Spotlight: Singulr AI – Cyber Defense Magazine

The AI Governance Tightrope: Enabling Innovation Without Compromising Security  Cybersecurity leaders are facing a critical inflection point. The rapid emergence…

AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense
03
Oct
2025

AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense

Quick Summary: AI agents enable security teams to surge ahead of the most advanced threats using automated decision-making, real time response, and…

Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing
03
Oct
2025

Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing

In today’s interconnected digital landscape, businesses are more dependent than ever on third-party vendors and partners. While these relationships bring…