Category: CyberDefenseMagazine

Russia, Apple, And the New Front Line in The Fight for Internet Freedom
30
Dec
2024

Russia, Apple, And the New Front Line in The Fight for Internet Freedom

Russia’s reputation for suppressing internet freedom and free expression is well documented. VPNs have long had a contentious relationship with…

Print Friendly, PDF & Email
25
Dec
2024

Understanding Modern Security Postures –

Making sense of modern security postures can be challenging. In the past few years, the complexity of most IT environments…

Print Friendly, PDF & Email
24
Dec
2024

It Takes a Village – and a Lot of Time – to Manage Data Security and Compliance –

For security teams, sensitive content is generally at the centre of what they need to protect in their corporate IT…

Print Friendly, PDF & Email
24
Dec
2024

ETSI Security Conference 2024 – Post-Quantum Cryptography w/ Daniele Lacamera –

Daniele Lacamera is a software technologist and researcher. He is an expert in operating systems and TCP/IP, with more than…

Print Friendly, PDF & Email
24
Dec
2024

The Importance of Cybersecurity Hygiene –

Good cyber hygiene refers to the proactive steps and best practices users and organizations can take to keep their online…

Print Friendly, PDF & Email
24
Dec
2024

Don’t Gift Your Data This Christmas –

It’s December, Christmas music is everywhere and the holiday season is in full swing. As people look to buy gifts…

Securing the OT Stage: NIS2, CRA, and IEC62443 Take Center Spotlight
23
Dec
2024

Securing the OT Stage: NIS2, CRA, and IEC62443 Take Center Spotlight

In the dynamic landscape of Operational Technology (OT), robust cybersecurity measures are paramount. As the digital transformation accelerates, protecting critical…

Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses
21
Dec
2024

Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses

The specter of security vulnerabilities is a constant concern in today’s digital landscape. They’re the hidden pitfalls that can undermine…

Is There a DDoS Attack Ceiling?
20
Dec
2024

Is There a DDoS Attack Ceiling?

Today, it’s rare for a month to pass without reports of new distributed denial-of-service (DDoS) attacks. Lately, geopolitical instability and hacktivist groups…

Ditch The Cloud Security Labels to Nail Detection and Response
20
Dec
2024

Ditch The Cloud Security Labels to Nail Detection and Response

Today’s cloud security categories don’t do practitioners any favors when it comes to identifying the key requirements for detection and…

Scammer’s Delight: Don’t Gift Your Data This Christmas
18
Dec
2024

Scammer’s Delight: Don’t Gift Your Data This Christmas

It’s December, Christmas music is everywhere and the holiday season is in full swing. As people look to buy gifts…

Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure
18
Dec
2024

Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure

In an era where we are completely reliant on digital connectivity, the security of our critical infrastructure is paramount. CISA defines…