Category: CyberDefenseMagazine

Hidden in Plain Sight: Open-Source Software Vulnerabilities
14
Dec
2023

Hidden in Plain Sight: Open-Source Software Vulnerabilities

Open-source software (OSS), software which has had its original source code made available for redistribution and adaptation, has become so…

The Emergence of AI In the Enterprise: Know the Security Risks
14
Dec
2023

The Emergence of AI In the Enterprise: Know the Security Risks

By John Anthony Smith, CEO Conversant Group, and Eli Nussbaum, Managing Director, Conversant Group As businesses strive to keep up…

The Human Firewall: Strengthening the Weakest Link in Cybersecurity
14
Dec
2023

The Human Firewall: Strengthening the Weakest Link in Cybersecurity

By Steve Soukup, CEO, DefenseStorm Innovative technology has revolutionized the way we work and live by unlocking a wealth of…

The Rising Tide of Cybercrime as A Service (CaaS)
14
Dec
2023

The Rising Tide of Cybercrime as A Service (CaaS)

By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which,…

Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security
14
Dec
2023

Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security

By Alan Bavosa, VP of Security Products, Appdome In recent years, mobile apps have surged in popularity providing consumers with…

ETSI Security Conference 2023: Exploring Zero Trust Architecture with Dr. Galina Pildush
12
Dec
2023

ETSI Security Conference 2023: Exploring Zero Trust Architecture with Dr. Galina Pildush

ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, took place face-to-face from 16 to 19 October 2023, in ETSI, Sophia Antipolis, France, and gathered more…

SEC’s New Cybersecurity Rules to Strengthen Transparency and Accountability
12
Dec
2023

SEC’s New Cybersecurity Rules to Strengthen Transparency and Accountability

Why public companies should prepare now to safeguard their operations, reputation, and financial success. By Paul Truitt, Principal and National…

Redefining Operational Readiness with Predictive Maintenance Maximize the Resiliency of Our Nation’s Defense Assets
12
Dec
2023

Redefining Operational Readiness with Predictive Maintenance Maximize the Resiliency of Our Nation’s Defense Assets

By Michael Weigand, Co-Founder and Chief Growth Officer, Shift5 In its annual threat assessment, the Office of the Director of…

The $390 Million Alarm Bell: Why Cold Wallets Are No Longer Optional in Crypto
12
Dec
2023

The $390 Million Alarm Bell: Why Cold Wallets Are No Longer Optional in Crypto

By Mark Venables, CEO of The Crypto Merchant In July 2023, the cryptocurrency sector saw a significant escalation of cyber-related…

The 5 Things Every Leader Should Know for A Cyber-Vigilant Summer
12
Dec
2023

The 5 Things Every Leader Should Know for A Cyber-Vigilant Summer

By Michael Nizich, PhD, CISSP As another summer comes and goes and we start to prepare for another school year,…

The Embedded Systems and The Internet of Things
12
Dec
2023

The Embedded Systems and The Internet of Things

By Milica D. Djekic The Internet of Things (IoT) is a quite new concept dealing with the devices being connected…

New Phishing Attacks Use .ZIP to Target Brands
08
Dec
2023

New Phishing Attacks Use .ZIP to Target Brands

By Eric George, Director of Solutions Engineering, Fortra Researchers at Fortra have observed cybercriminals abusing New Top-Level Domain .zip in…