Category: CyberDefenseMagazine

Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market
28
Nov
2023

Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market

The health IT security market is experiencing remarkable growth, driven by the pressing need for robust solutions that protect patient…

Fearful Festivities: How to stay cyber safe this festive season
27
Nov
2023

Fearful Festivities: How to stay cyber safe this festive season

With Christmas Day being mere weeks away, jingle bells and debit cards will be tapping and tinkling for this year’s Black Friday sales. While online shopping offers…

Post-Quantum Cryptography: Safeguarding the Digital Future and Bolstering Security in Critical Sectors
26
Nov
2023

Post-Quantum Cryptography: Safeguarding the Digital Future and Bolstering Security in Critical Sectors

By Maila Zahra, Air University Islamabad and Zia Muhammad, North Dakota State University Post-quantum cryptography aims to develop secure cryptographic…

With Americans Traveling More Than Ever Before, It’s Time Businesses Increase Their Mobile Security Efforts
26
Nov
2023

With Americans Traveling More Than Ever Before, It’s Time Businesses Increase Their Mobile Security Efforts

If your colleagues are working from the road, follow these five steps to strengthen your mobile cybersecurity initiatives. By George…

Guarding Against the Insider Threat: Do Your Employees Pose the Greatest Risk?
24
Nov
2023

Guarding Against the Insider Threat: Do Your Employees Pose the Greatest Risk?

By Moty Kanias, VP of Cyber Strategy & Alliances, NanoLock Security Great businesses understand that their people are their most…

National Cyber Security Vulnerabilities in The Changing Security Environment
24
Nov
2023

National Cyber Security Vulnerabilities in The Changing Security Environment

Implications For the Resilience of The NATO Cyber and Information Space By Georgi Atanasov, Subject Matter Expert in Bulgarian ministry…

IPv6 Security – Part 3
23
Nov
2023

Data Loss Prevention Metrics: Measuring the Effectiveness of Your DLP Program

Data Loss Prevention (DLP) programs have emerged as a crucial component of an organization’s cybersecurity strategy. However, implementing a DLP…

Visibility Isn’t Enough; It’s What You Do with It That Counts
22
Nov
2023

Visibility Isn’t Enough; It’s What You Do with It That Counts

By Christina Richmond, Chief Strategy and Growth Officer, Inspira Enterprise As cyber risks continue to grow and evolve (here’s looking…

4 Key Security Challenges to Address with Confidential Computing
22
Nov
2023

4 Key Security Challenges to Address with Confidential Computing

Confidential Computing delivers a variety of security benefits and helps deliver a platform for controlled, compliant activation of sensitive data…

Four Years and a Pandemic Later: Have Agencies Become Cloud Smart?
20
Nov
2023

Four Years and a Pandemic Later: Have Agencies Become Cloud Smart?

By James Langley, Master Solutions Consultant, Hitachi Vantara Federal June 2023 marked the four-year anniversary of the release of the…

Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises
20
Nov
2023

Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises

By Walt Szablowski, Founder and Executive Chairman, Eracent Summary: With the increasing frequency and sophistication of cyberattacks in the digital…

How Google Play Store Security May Fail to Protect Users from Stealthy Malware
18
Nov
2023

How Google Play Store Security May Fail to Protect Users from Stealthy Malware

Incremental Malicious Update Attack (IMUTA) By Zia Muhammad and Zahid Anwar, Department of Computer Science, NDSU Android is the leading…