Category: CyberDefenseMagazine

How to Better Manage Vulnerabilities and Prevent Destructive Cyberattacks
10
Oct
2024

How to Better Manage Vulnerabilities and Prevent Destructive Cyberattacks

The recent massive data breach at National Public Data may have exposed anywhere from 1.3 million to 2.9 billion financial records and…

Worried about Insider Risk? Pay More Attention to Offboarding
10
Oct
2024

Worried about Insider Risk? Pay More Attention to Offboarding

Discussions of insider risk inevitably conjure images of disgruntled IT employees stealing sensitive data from the comfort of an air-conditioned…

The Role of Intelligence in Cyber Threat Response
09
Oct
2024

The Role of Intelligence in Cyber Threat Response

1) The Reality of Cybersecurity Threats and Response As technology develops and digitalization progresses, cybersecurity threats are becoming increasingly diverse…

innovator-spotlight-concentric-ai
09
Oct
2024

Innovator Spotlight: Concentric AI – Cyber Defense Magazine

It’s not enough for companies to just discover and monitor sensitive data. They need tools that can proactively fix any…

Building a robust NIS 2 compliance strategy
08
Oct
2024

Building a robust NIS 2 compliance strategy

Arriving on 17th October this year, NIS 2 is the EU’s most stringent cybersecurity Directive so far. Your level of cybersecurity…

Unmasking Shadow Apps to Secure Your SaaS Stack
08
Oct
2024

Unmasking Shadow Apps to Secure Your SaaS Stack

It is a tale almost as old as time: users click download, install, and accept as they adopt new software…

How Automation Can Help Security Policy Optimization
08
Oct
2024

How Automation Can Help Security Policy Optimization

One of the recurring questions we hear from network security leaders is “why aren’t our security policies optimized?” The answer,…

Beyond Fines: The Real Value of Achieving Cybersecurity Compliance
07
Oct
2024

Beyond Fines: The Real Value of Achieving Cybersecurity Compliance

Achieving cybersecurity compliance is often seen as a regulatory necessity, primary to avoid hefty fines and legal repercussions. However, the…

It’s Time to Sound the Alarm on SMB Cyber Threats
06
Oct
2024

It’s Time to Sound the Alarm on SMB Cyber Threats

There’s an unnerving secret many of us in cybersecurity have noticed. And if you think your company is “too small”…

Escalating Cyberattacks in the Healthcare Sector
05
Oct
2024

Escalating Cyberattacks in the Healthcare Sector

The healthcare sector has become a prime target for cyberattacks, with the frequency and sophistication of these attacks increasing rapidly…

SEC Cybersecurity Disclosure Rules – Are CISOs Ready to Go Beyond the Tip of the Iceberg?
04
Oct
2024

SEC Cybersecurity Disclosure Rules – Are CISOs Ready to Go Beyond the Tip of the Iceberg?

It’s been more than six months since the SEC’s updated Cybersecurity Disclosure rules came into force. These rules represent a…

From Detection to Defense: Evolving Risk Management Amid Rising Cybercrime
04
Oct
2024

From Detection to Defense: Evolving Risk Management Amid Rising Cybercrime

The cyber threat landscape continues to evolve rapidly. The year has not ended yet but we have witnessed an increasing…