Category: CyberDefenseMagazine

4 Unexpected Ways AI Bias Can Jeopardize Cybersecurity
28
Dec
2023

Evolving Cyber Threats in a World of AI: What Can We Expect From 2024?

2023 has been another transformative year for the cyber security industry. The advent of AI has brought significant advantages to…

Proven Strategies to Fix This Cybersecurity Shortage
28
Dec
2023

Proven Strategies to Fix This Cybersecurity Shortage

Cyber Leader and Former Marine breaks down how we can recruit and train new cyber talent for this growing tech…

Securing The Virtual Runway to The Cloud
28
Dec
2023

Securing The Virtual Runway to The Cloud

By Jason Mafera, Field CTO, North America, IGEL The ‘endpoint’ has transformed from traditional desktop hardware to any number of…

Sophisticated Cyber Threats Require a New Approach to Digital Security in Healthcare.
28
Dec
2023

Sophisticated Cyber Threats Require a New Approach to Digital Security in Healthcare.

By Saeed Valian, Chief Information Security Officer, symplr In the era of modernization, healthcare organizations are pushing for digitalization in…

The Case Study: The Exploitation of Business Assets
28
Dec
2023

The Case Study: The Exploitation of Business Assets

By Milica D. Djekic The role of this case study is to explain how it’s feasible to exploit some business…

Combatting Social Engineering – The Invisible Threat
26
Dec
2023

Combatting Social Engineering – The Invisible Threat

By Brendan Horton, Security Analyst at FoxPointe Solutions Cybersecurity is often associated with technical vulnerabilities and sophisticated defenses. However, one…

Cyber Strategy Is Not a Synonym for Tech Stack
26
Dec
2023

Cyber Strategy Is Not a Synonym for Tech Stack

By Craig Burland, CISO, Inversion6 Formula 1 (F1) is the pinnacle of motor racing. Winning means staying on the grid….

Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket
26
Dec
2023

Mobile Insecurity: Unmasking the Vulnerabilities in Your Pocket

Understanding the Risks and Best Practices for Mobile Security By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine Mobile devices…

Beyond Mere Compliance
26
Dec
2023

Beyond Mere Compliance

Smart teams manage and mitigate cyber risks By Michael Cocanower, CEO, AdviserCyber Wise business owners don’t purchase fire alarms and…

Stronger Together: Attack Surface Management and Security Validation
24
Dec
2023

Stronger Together: Attack Surface Management and Security Validation

By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as…

How to Unify Multiple Analytics Systems to Determine Security Posture and Overall Risk
24
Dec
2023

How to Unify Multiple Analytics Systems to Determine Security Posture and Overall Risk

By Amol Bhagwat, VP, Solutions and Field Engineering at Gurucul As the threat landscape continues to get more complex, security…

How to Overcome the Most Common Challenges with Threat Intelligence
24
Dec
2023

How to Overcome the Most Common Challenges with Threat Intelligence

By David Monnier, Chief Evangelist, Team Cymru Fellow What would be your ideal approach to protecting your organization? Knowing exactly…