Category: CyberDefenseMagazine

Safeguard Business Transactions with Online Payment Security Tips
08
Dec
2023

Safeguard Business Transactions with Online Payment Security Tips

By Zac Amos, Features Editor, ReHack Secure online payments have become an integral part of the shopping experience. More people…

Increase In Mobile Threats Calls for A Proactive Mindset.
08
Dec
2023

Increase In Mobile Threats Calls for A Proactive Mindset.

By Nicole Allen, Senior Marketing Executive at Salt Communications Mobile threats are always evolving in the world of business. Threats…

Let’s Ease Up on the Cyber Criminal High Tech Hype
07
Dec
2023

Why digital transformation needs more flexible security testing

Whether it’s a global enterprise redefining a business process using cloud computing and machine learning or a sole trader setting…

It’s Not Me, It’s You: Your Biggest Cybersecurity Risks Are Your Partners
06
Dec
2023

It’s Not Me, It’s You: Your Biggest Cybersecurity Risks Are Your Partners

By Craig Burland, CISO, Inversion6 You’ve been laser focused on driving cybersecurity risk out of your organization and made great…

Learning Lessons from The Recent MOVEit Hack
06
Dec
2023

Learning Lessons from The Recent MOVEit Hack

Jack Viljoen, Head of Prodinity Cyber Solutions, provides a cyber safety 101 to avoid vendor-related cyber-attacks. By Jack Viljoen, Prodinity…

Navigating the Uncertainties of CMMC 2.0: An Urgent Call for Clarity
06
Dec
2023

Navigating the Uncertainties of CMMC 2.0: An Urgent Call for Clarity

Unpacking the Complexities, Implications, and Future Outlook of the Cybersecurity Maturity Model Certification By David Brewer, Director of IT/Cybersecurity (Acting),…

Cybersecurity Awareness Month: The Overlooked Importance of API Security
05
Dec
2023

Distributed Applications & Security – Cybersecurity Magazine

The advent of Cloud providers in a big way impacts the way we are developing new applications since in most…

IT Modernization Efforts Need to Prioritize Cybersecurity
02
Dec
2023

IT Modernization Efforts Need to Prioritize Cybersecurity

By Mark Marron, CEO and President, ePlus, Inc. Organizations are increasingly advancing their digital transformation efforts to deliver internal efficiencies,…

01
Dec
2023

How to Avoid Common Security Incidents in the Public Cloud

By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the…

An Integrated Approach Is Essential for Combating Insider Threats — Here’s Why
30
Nov
2023

Why Harness the Full Potential of Zero-Trust Architecture to Secure OT Environments?

Zero-trust architecture is becoming popular because it is a more comprehensive cybersecurity framework than previous castle-and-moat models. Increasing internal threat…

From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies
30
Nov
2023

From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies

By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security…

4 Unexpected Ways AI Bias Can Jeopardize Cybersecurity
29
Nov
2023

ETSI Security Conference 2023: Dr. Claire Vishik and the Future of Cybersecurity

ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, took place face-to-face from 16 to 19 October 2023, in ETSI, Sophia Antipolis, France, and gathered more…