Category: CyberDefenseMagazine

Closing The Gap: Resolving Human Error in Cloud Security
25
Oct
2023

Closing The Gap: Resolving Human Error in Cloud Security

By Patrick Pocalyko, GM North America, CYREBRO Cybersecurity technology is critical to securing the cloud but it’s easy to forget…

Tech-Forward Strategies to Effectively Fight Fraud
24
Oct
2023

Tech-Forward Strategies to Effectively Fight Fraud

By Blair Cohen, Founder and President, AuthenticID Not only has digital transformation completely reshaped the way we conduct business, but…

Why You Should Prioritize Your Privacy Policies
24
Oct
2023

Why You Should Prioritize Your Privacy Policies

By Jason M. Schwent, Senior Counsel, Clark Hill The enactment of the California Online Privacy Protection Act of 2003 created…

Steps for Preparing for a Quantum-Resistant Cryptographic Future
23
Oct
2023

Steps for Preparing for a Quantum-Resistant Cryptographic Future

By Timothy Hollebeek, Industry Technology Strategist, DigiCert The rise of post-quantum cryptography (PQC) is shedding light on the pervasive nature…

What is Malvertising?
23
Oct
2023

What is Malvertising? – Cyber Defense Magazine

Best practices for avoiding novel threats online By Tom McVey, Senior Sales Engineer EMEA, Menlo Security Artificial intelligence has transformed…

Secure Remote Access is Not a One Size Fits All Vision
22
Oct
2023

Secure Remote Access is Not a One Size Fits All Vision

Unlocking the puzzle of OT security By Kevin Kumpf, Cybersecurity Evangelist at Cyolo Secure Remote Access (SRA) is a term…

Lessons Learned: Cyberattack Shutters Five Illinois Healthcare Facilities
22
Oct
2023

Lessons Learned: Cyberattack Shutters Five Illinois Healthcare Facilities

Growing Cyber Attacks Pose Existential Threats to Business – Can More Connected And Efficient Security Help Organizations Gain The Upper…

ISO Certification is the Key to Better Cybersecurity for Business
21
Oct
2023

ISO Certification is the Key to Better Cybersecurity for Business

By Sami Mäkiniemelä, Chief Security Officer, Miradore Cyberattacks are on the rise. Every month it seems like another major business…

From Chaos to Control: The Crucial Role of Cyber Incident Response for SMBs
21
Oct
2023

From Chaos to Control: The Crucial Role of Cyber Incident Response for SMBs

How to create a well-defined incident response plan By David Chernitzky, Co-founder and CEO, Armour Cybersecurity Cybersecurity incidents can result…

Six Must-Focus Cybersecurity Areas in Network Sprawl
20
Oct
2023

Six Must-Focus Cybersecurity Areas in Network Sprawl

By Zachary Folk, Director of Solutions Engineering, Camelot Secure The anticipated benefits of 5G’s faster speed, lower latency, and greater…

Meeting the highest standards of end-to-end encryption to defend your data
19
Oct
2023

Meeting the highest standards of end-to-end encryption to defend your data

Data is arguably an organisation’s biggest asset, which makes it a key target for cybercriminals. With 26 per cent of…

Securing Police Communications: Protecting Communities
19
Oct
2023

Securing Police Communications: Protecting Communities

By Nicole Allen, Senior Marketing Executive at Salt Communications Probably now more than ever, secure communications are crucial for Policing…