Category: CyberDefenseMagazine

Artificial Deception: The State Of “AI” In Defense and Offense
05
Jan
2024

Artificial Deception: The State Of “AI” In Defense and Offense

By Ken Westin, Field CISO, Panther Labs If you have seen any of my talks, I often say that the…

Master Security by Building on Compliance with A Risk-Centric Approach
05
Jan
2024

Master Security by Building on Compliance with A Risk-Centric Approach

By Meghan Maneval, Vice President of Product Strategy and Evangelism, RiskOptics In recent years, a confluence of circumstances has led…

Charting a Trustworthy AI Journey
05
Jan
2024

Charting a Trustworthy AI Journey

Sound cybersecurity principles for responsible generative AI innovation By Lisa O’Connor, Managing Director—Accenture Security, Cybersecurity R&D, Accenture Labs As companies…

Protect your business from the inside out with zero-trust security
04
Jan
2024

Technology, regulation and the human touch: three pointers to stop cyber-crime

Geopolitical tensions, rapid advances in computing technology and the accelerated pace at which we live our lives online are raising the stakes…

Understanding the Escalating Threat of Web DDoS Tsunami Attacks
03
Jan
2024

Understanding the Escalating Threat of Web DDoS Tsunami Attacks

By Uri Dorot, Senior Security Solutions Lead at Radware Whether it’s hacktivists conducting cyberwarfare or ransom-seeking criminals targeting vulnerable firms…

As Digital Payments Explode in Popularity, Cybercriminals are Taking Notice
03
Jan
2024

As Digital Payments Explode in Popularity, Cybercriminals are Taking Notice

By Norman Comstock, Managing Director, and Luke Nelson, Managing Director, Cybersecurity Solutions, UHY Consulting With $54 trillion in payments flowing…

Why Continuous Training Must Come Before The AI-driven SDLC
03
Jan
2024

Why Continuous Training Must Come Before The AI-driven SDLC

By Mike Burch, Director of Application Security, Security Journey Despite the hype, generative AI is unlikely to transform the world….

Phishing in 2024: Here's What to Expect
02
Jan
2024

Phishing in 2024: Here’s What to Expect

Phishing, a deceptive practice where cybercriminals impersonate legitimate entities to extract sensitive information, has been a significant threat in the…

The Future of Modern Networks Is Automated Threat Intelligence.
01
Jan
2024

The Future of Modern Networks Is Automated Threat Intelligence.

By Amit Dhingra, Executive Vice President of Network Services, NTT During the past three years, the enterprise cybersecurity environment has…

The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of
01
Jan
2024

The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of

By Ivan Shefrin, Executive Director, Managed Security Services, Comcast Business The rise of DDoS attacks is old news. Now, these…

The U. S. Cyber Trust Mark: Providing Assurance That IoT Devices Are Trustworthy
01
Jan
2024

The U. S. Cyber Trust Mark: Providing Assurance That IoT Devices Are Trustworthy

By Mike Nelson, Vice President of Digital Trust, DigiCert It’s safe to say that in 2023, the Internet of Things…

URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes
01
Jan
2024

URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes

By Zack Schwartz, Chief Revenue Officer, Trustifi As a provider of cybersecurity, we notice when certain trends begin to emerge,…