Category: CyberDefenseMagazine

OT Cybersecurity: Safeguarding Building Operations in a Digitized World
15
Jan
2024

OT Cybersecurity: Safeguarding Building Operations in a Digitized World

By Mirel Sehic, Global Director of Cyber Security, Honeywell In an increasingly digitized world, the looming threat of cyberattacks has…

7 Steps to Build a Defense in Depth Strategy for Your Home
13
Jan
2024

7 Steps to Build a Defense in Depth Strategy for Your Home

By Roger Spears – Cybersecurity Project Manager, Schneider Downs One of the primary pillars of cybersecurity is having a “defense…

Zombie APIs: The Scariest Threat Lurking in The Shadows?
13
Jan
2024

Zombie APIs: The Scariest Threat Lurking in The Shadows?

By Dan Hopkins, VP of Engineering at StackHawk IT modernization and digital transformation initiatives, combined with faster software deployment lifecycles,…

Why cyber risk is one of the top critical risks facing organisations today – and why it’s growing
12
Jan
2024

How businesses can mitigate risks and uphold compliance in 2024

Managing data privacy and compliance risks is becoming increasingly difficult year on year for businesses. Cybercriminals continue to evolve their…

The Crucial Need for a Secure Software Development Lifecycle (SSDLC) in Today’s Digital Landscape
11
Jan
2024

The Crucial Need for a Secure Software Development Lifecycle (SSDLC) in Today’s Digital Landscape

By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation. “Securing the software delivery…

Beyond Passwords: AI-Enhanced Authentication in Cyber Defense
11
Jan
2024

Beyond Passwords: AI-Enhanced Authentication in Cyber Defense

By Kathleen Dcruz Why all the noise about artificial intelligence? Now more than ever, AI is becoming part of our…

User credentials are by far the best hack
09
Jan
2024

Startling Intellectual Property Theft Insights Every CISO Should Know

In an era where information is as valuable as currency, intellectual property (IP) theft has emerged as a silent yet formidable threat…

AI And Ad Fraud: Growing Risks for Marketers Using Google’s AI-Based Advertising Campaigns
09
Jan
2024

AI And Ad Fraud: Growing Risks for Marketers Using Google’s AI-Based Advertising Campaigns

Google’s Performance Max (PMax) – AI has ignited a flurry of concerns relating to data protection and security, and organisations…

Bolster an Organizational Cybersecurity Strategy with External Data Privacy
09
Jan
2024

Bolster an Organizational Cybersecurity Strategy with External Data Privacy

Enterprise threat protection is missing this critical component By Harry Maugans, CEO, Privacy Bee Companies fight hard to find, cajole…

An Age-by-Age Guide to Online Safety for Kids
07
Jan
2024

An Age-by-Age Guide to Online Safety for Kids

By Chelsea Hopkins, Social Media Manager, Fasthosts The internet is a fast-changing world of information that allows kids to play,…

Your #1 Security Initiative in 2024 Should be Operational Resilience
07
Jan
2024

Your #1 Security Initiative in 2024 Should be Operational Resilience

The cyber world is filled with lots of scary threats and new buzzwords, none of them bigger than AI. As…

Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds
07
Jan
2024

Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds

Digital transformation has urged organizations across various industries to adopt multi-cloud strategies. They need to find the right balance for…