Category: CyberDefenseMagazine

Six Must-Focus Cybersecurity Areas in Network Sprawl
20
Oct
2023

Six Must-Focus Cybersecurity Areas in Network Sprawl

By Zachary Folk, Director of Solutions Engineering, Camelot Secure The anticipated benefits of 5G’s faster speed, lower latency, and greater…

Meeting the highest standards of end-to-end encryption to defend your data
19
Oct
2023

Meeting the highest standards of end-to-end encryption to defend your data

Data is arguably an organisation’s biggest asset, which makes it a key target for cybercriminals. With 26 per cent of…

Securing Police Communications: Protecting Communities
19
Oct
2023

Securing Police Communications: Protecting Communities

By Nicole Allen, Senior Marketing Executive at Salt Communications Probably now more than ever, secure communications are crucial for Policing…

Key Factors and Measures to Address Burnout In The Cybersecurity Field
19
Oct
2023

Key Factors and Measures to Address Burnout In The Cybersecurity Field

The underlying threat to organizations By Kunal Purohit, Chief Digital Services Officer, Tech Mahindra In Today’s world Cyber-attacks may be…

Cybercrime, Cyber Warfare, and Government Attitudes Towards Cybersecurity
18
Oct
2023

Cybercrime, Cyber Warfare, and Government Attitudes Towards Cybersecurity

By Avishai Avivi, CISO, SafeBreach The face of cybersecurity is evolving. Cybercrime and its implications have grown into an inescapable…

Ensuring Container Security: Safeguarding the Future Of Cloud Computing
18
Oct
2023

Ensuring Container Security: Safeguarding the Future Of Cloud Computing

Containerization has revolutionized the world of software development. By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research…

Passive Optical Networks: A Game Changer for Now And The Future
17
Oct
2023

Passive Optical Networks: A Game Changer for Now And The Future

By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC…

Will Zero Trust Replace SD-WAN?
17
Oct
2023

Will Zero Trust Replace SD-WAN?

By Jaye Tillson, Director of Strategy, Axis Security A question I get asked frequently is, “Will zero trust replace SD-WAN?”….

LoRaWAN Security - Cybersecurity Magazine
17
Oct
2023

LoRaWAN Security – Cybersecurity Magazine

Abstract: The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties…

MOVEit’s Ransomware Attack Highlights the State of Cybersecurity
16
Oct
2023

MOVEit’s Ransomware Attack Highlights the State of Cybersecurity

By Ben Smith, Field Chief Technology Officer, NetWitness Vulnerability is a four-letter word in the world of cybersecurity, as one…

Securing the Cloud
16
Oct
2023

Securing the Cloud – Cyber Defense Magazine

Organizational Data Security Strategy – Bring Your Own Key (Byok) By Chris Allen, Senior Solutions Architect, Cryptomathic. Cloud computing is…

How Hacking of The Internet of Things Works In Practice
15
Oct
2023

How Hacking of The Internet of Things Works In Practice

By Milica D. Djekic The Internet of Things (IoT) represents a collection of devices being capable to talk to each…