Category: CyberDefenseMagazine
The health IT security market is experiencing remarkable growth, driven by the pressing need for robust solutions that protect patient…
With Christmas Day being mere weeks away, jingle bells and debit cards will be tapping and tinkling for this year’s Black Friday sales. While online shopping offers…
By Maila Zahra, Air University Islamabad and Zia Muhammad, North Dakota State University Post-quantum cryptography aims to develop secure cryptographic…
If your colleagues are working from the road, follow these five steps to strengthen your mobile cybersecurity initiatives. By George…
By Moty Kanias, VP of Cyber Strategy & Alliances, NanoLock Security Great businesses understand that their people are their most…
Implications For the Resilience of The NATO Cyber and Information Space By Georgi Atanasov, Subject Matter Expert in Bulgarian ministry…
Data Loss Prevention (DLP) programs have emerged as a crucial component of an organization’s cybersecurity strategy. However, implementing a DLP…
By Christina Richmond, Chief Strategy and Growth Officer, Inspira Enterprise As cyber risks continue to grow and evolve (here’s looking…
Confidential Computing delivers a variety of security benefits and helps deliver a platform for controlled, compliant activation of sensitive data…
By James Langley, Master Solutions Consultant, Hitachi Vantara Federal June 2023 marked the four-year anniversary of the release of the…
By Walt Szablowski, Founder and Executive Chairman, Eracent Summary: With the increasing frequency and sophistication of cyberattacks in the digital…
Incremental Malicious Update Attack (IMUTA) By Zia Muhammad and Zahid Anwar, Department of Computer Science, NDSU Android is the leading…