Category: CyberDefenseMagazine

Lockin Company’s Approach to Zero Trust Security and Rising Phishing Threats with its security software LIAPP, LIKEY, and LISS
02
Oct
2024

Lockin Company’s Approach to Zero Trust Security and Rising Phishing Threats with its security software LIAPP, LIKEY, and LISS

LIAPP (Lockin App Protector) is an integrated mobile app security service developed by Lockin Company, a Korean-based security company dedicated…

The Next Iteration of Privacy: What Businesses Should Know About New Privacy Laws in Oregon, Texas, and Florida
02
Oct
2024

The Next Iteration of Privacy: What Businesses Should Know About New Privacy Laws in Oregon, Texas, and Florida

As businesses enter the third quarter of 2024, they need to contend with three new state privacy laws. The Texas…

Fighting AI with AI: How to Improve Network Security
01
Oct
2024

Fighting AI with AI: How to Improve Network Security

The generative AI revolution is creating turmoil in the cybersecurity world. Security has always been a technologyrace. On one hand, it’s a…

What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help
01
Oct
2024

What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help

On July 3rd the period for public comment closed for the U.S. Cybersecurity and Infrastructure Security Agency’s proposed Cyber Incident…

Cybersecurity In Critical Infrastructure: Protecting Power Grids and Smart Grids
30
Sep
2024

Cybersecurity In Critical Infrastructure: Protecting Power Grids and Smart Grids

Infrastructure like water system, supply system, telecommunication networks, and power plants are critical assets for any country in that the…

From Burnout to Balance: How AI Supports Cybersecurity Professionals
29
Sep
2024

From Burnout to Balance: How AI Supports Cybersecurity Professionals

As technology advances, cyber threats are becoming more complex and harder to combat. According to Cobalt’s State of Pentesting Report, this…

Getting Out in Front of Post-Quantum Threats with Crypto Agility
28
Sep
2024

Getting Out in Front of Post-Quantum Threats with Crypto Agility

Ready or not, quantum computing technology is rapidly advancing, and its new capabilities will be available sooner than most think….

Innovator Spotlight: Zilla Security
27
Sep
2024

Innovator Spotlight: Zilla Security – Cyber Defense Magazine

by Dan K. Anderson CEO, CISO, and vCISO As organizations grow, managing access to critical systems and ensuring compliance with…

innovator-spotlight-guardio
27
Sep
2024

Innovator Spotlight: Guardio – Cyber Defense Magazine

Cyber threats are becoming more sophisticated, putting both individuals and businesses at significant risk. The rise in phishing attacks, identity…

Breaking free from hackers: Can air gapping protect corporate data?
27
Sep
2024

Breaking free from hackers: Can air gapping protect corporate data?

A recent Cyber Security Breaches Survey revealed that approximately 22% of UK businesses and 14% of charities had experienced cybercrimes in the last 12…

Top Tips and Risks Ahead of the 2024 Olympic Games
27
Sep
2024

Top Tips and Risks Ahead of the 2024 Olympic Games

As buzz and excitement continues to build around the upcoming 2024 Summer Olympics, it is important to be aware of the…

The MDR That Sees It All
26
Sep
2024

The MDR That Sees It All

Unmonitored infrastructure is a major source of initial compromises for enterprises.  The Critical Start MDR solution counters this with endpoint…