Category: CyberDefenseMagazine

Increase in Phishing Threats among Organizations Has Created a Lot of Opportunities for the Cyber Security Industry
31
Oct
2023

Increase in Phishing Threats among Organizations Has Created a Lot of Opportunities for the Cyber Security Industry

By Koyal Ghosh, Senior Writer, Allied Market Reasearch Growing trend of BYOD and smart assimilation of machine learning, IoT, and…

4 Secure Framework Considerations Before Deploying Workloads in The Public Cloud
30
Oct
2023

4 Secure Framework Considerations Before Deploying Workloads in The Public Cloud

By Jhilam Biswas, Customer Engineering Manager, Google Cloud Enterprises are adopting public cloud providers like never before. Gartner estimated the…

Fend Off the Next Phishing Attack With A “Human Firewall.”
29
Oct
2023

Fend Off the Next Phishing Attack With A “Human Firewall.”

Implement the ‘Mindset – Skillset – Toolset’ triad By Dr. Yvonne Bernard, CTO, Hornetsecurity Spear phishing continues to be the…

Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy in A Data-Centric World
28
Oct
2023

Evolving Data Landscape: Rethinking the Privacy-Security Dichotomy in A Data-Centric World

By Ani Chaudhuri, CEO, Dasera The EU-US Data Privacy Framework is a product of years of painstaking negotiation, a well-intended…

Why cybersecurity needs to be part of ESG
27
Oct
2023

Why cybersecurity needs to be part of ESG

ESG (Environmental, Social, and Governance) policies tend to be viewed as being predominantly concerned with climate change and the social…

8 Tips for Best Results in Red-Teaming
27
Oct
2023

8 Tips for Best Results in Red-Teaming

By Zac Amos, Features Editor, ReHack In cybersecurity, a red team exercise is a unique way to ensure businesses can…

Why Compliance Matters When Dealing with AI and Finances
26
Oct
2023

Why Compliance Matters When Dealing with AI and Finances

By Saeid Hejazi, Founder, Wally Artificial intelligence has skyrocketed in popularity in recent months, particularly as the widespread availability and…

Effective Workplace Education is Built Around Incentives
26
Oct
2023

Effective Workplace Education is Built Around Incentives

How Companies Can Personalize Cybersecurity Awareness Training By Asaf Kotsel, CEO, Dcoya The key to a successful workplace education platform…

How Cyber Risk Quantification can Help Align CISOs with the Board.
26
Oct
2023

How Cyber Risk Quantification can Help Align CISOs with the Board.

By Lior Bar-Lev, VP Strategy & BizOps, CYE Recently, the American National Institute for Standards and Technology (NIST) released a…

Stronger Together: Attack Surface Management and Security Validation
26
Oct
2023

Stronger Together: Attack Surface Management and Security Validation

By Mike Talon, Director, Cybersecurity Architect, Cymulate The digital threat landscape is becoming more dangerous with each passing year as…

How False Positive Rates Impact E-Commerce Conversion Rates: Balancing Security & UX
25
Oct
2023

How False Positive Rates Impact E-Commerce Conversion Rates: Balancing Security & UX

By Benjamin Fabre, CEO & Co-founder, DataDome In the world of e-commerce, ensuring the security of online transactions is crucial….

When it Comes to ZTNA, Buyer Beware
25
Oct
2023

When it Comes to ZTNA, Buyer Beware

By Denny LeCompete, CEO, Portnox With traditional perimeter-based defenses proving inadequate thanks to the rise of remote and hybrid work…