Category: CyberDefenseMagazine

A Combination of BB84 Quantum Key Distribution and An Improved Scheme of NTRU Post-Quantum Cryptosystem
10
Mar
2023

A Combination of BB84 Quantum Key Distribution and An Improved Scheme of NTRU Post-Quantum Cryptosystem

Abstract: The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker…

How Zero Trust Enables More Effective Security Management
09
Mar
2023

How Zero Trust Enables More Effective Security Management

Moving to Zero Trust Architecture as a standard By Jim Hietala, Vice President of Business Development and Security at The…

Making the most of your time at the RSA 2023 conference
08
Mar
2023

Making the most of your time at the RSA 2023 conference

Ben Rothke, CISSP, CISM, CISA, is a Senior Information Security Manager at Tapad Going to RSA 2023? Failing to plan…

Has Adoption of ‘Connected Devices’ Outpaced Security?
08
Mar
2023

Has Adoption of ‘Connected Devices’ Outpaced Security?

By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of…

How to Stay GDPR Compliant While Sending Cold Emails
08
Mar
2023

How to Stay GDPR Compliant While Sending Cold Emails

Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important…

Europe Envies America’s Cybersecurity Industry. What Can We Learn from It?
06
Mar
2023

Europe Envies America’s Cybersecurity Industry. What Can We Learn from It?

Europe’s cyber industry has huge potential. Copying what’s worked in the US is a route to realising that promise. By…

Expanding Macroeconomic Pressure And Attack Surface Will Drive Security Automation In 2023
06
Mar
2023

Expanding Macroeconomic Pressure And Attack Surface Will Drive Security Automation In 2023

By Leonid Belkind, CTO and Co-Founder, Torq Security automation continued to have significant, positive impact across myriad cybersecurity applications in…

Cybersecurity: Your Guide to Digital Identity
04
Mar
2023

Cybersecurity: Your Guide to Digital Identity

Digital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works…

Does Your Company Have a Dark Data Problem?
04
Mar
2023

Does Your Company Have a Dark Data Problem?

By Dannie Combs, SVP and Chief Information Security Officer, Donnelley Financial Solutions (DFIN) Don’t let the name fool you: dark…

A Comparative Analysis of Digital Forensic Investigation Tools on Facebook Messenger Applications
03
Mar
2023

A Comparative Analysis of Digital Forensic Investigation Tools on Facebook Messenger Applications

Abstract: Technological developments make it easier for people to communicate and share information. Facebook Messenger is an instant messenger that…

Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush?
02
Mar
2023

Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush?

By Camellia Chan, CEO & founder of Flexxon I was honored to be one of the representatives from 36 nations,…

Cybersecurity Attacks To Come: Here’s How To Prepare
02
Mar
2023

Cybersecurity Attacks To Come: Here’s How To Prepare

By Russ Reeder, CEO, Netrix Global Ensuring 100% prevention against all cyberattacks is impossible today, as modern perpetrators find more…