Category: CyberDefenseMagazine

The Digital Transformation Blueprint: A Mosaic of Technology, Collaboration, And Security
30
Dec
2023

The Digital Transformation Blueprint: A Mosaic of Technology, Collaboration, And Security

By Ani Chaudhuri, CEO, Dasera In the Digital Age, businesses confront a dynamic landscape, compelled by the allure of innovation…

The Evolving Landscape of Ransomware Attacks
30
Dec
2023

The Evolving Landscape of Ransomware Attacks

2023 – What is new in the world of Ransomware By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Ransomware has…

4 Unexpected Ways AI Bias Can Jeopardize Cybersecurity
28
Dec
2023

Evolving Cyber Threats in a World of AI: What Can We Expect From 2024?

2023 has been another transformative year for the cyber security industry. The advent of AI has brought significant advantages to…

Proven Strategies to Fix This Cybersecurity Shortage
28
Dec
2023

Proven Strategies to Fix This Cybersecurity Shortage

Cyber Leader and Former Marine breaks down how we can recruit and train new cyber talent for this growing tech…

Securing The Virtual Runway to The Cloud
28
Dec
2023

Securing The Virtual Runway to The Cloud

By Jason Mafera, Field CTO, North America, IGEL The ‘endpoint’ has transformed from traditional desktop hardware to any number of…

Sophisticated Cyber Threats Require a New Approach to Digital Security in Healthcare.
28
Dec
2023

Sophisticated Cyber Threats Require a New Approach to Digital Security in Healthcare.

By Saeed Valian, Chief Information Security Officer, symplr In the era of modernization, healthcare organizations are pushing for digitalization in…

The Case Study: The Exploitation of Business Assets
28
Dec
2023

The Case Study: The Exploitation of Business Assets

By Milica D. Djekic The role of this case study is to explain how it’s feasible to exploit some business…

Combatting Social Engineering – The Invisible Threat
26
Dec
2023

Combatting Social Engineering – The Invisible Threat

By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one…

Cyber Strategy Is Not a Synonym for Tech Stack
26
Dec
2023

Cyber Strategy Is Not a Synonym for Tech Stack

By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid….

Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket
26
Dec
2023

Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket

Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices…

Beyond Mere Compliance
26
Dec
2023

Beyond Mere Compliance

Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and…

Stronger Together: Attack Surface Management and Security Validation
24
Dec
2023

Stronger Together: Attack Surface Management and Security Validation

By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as…