Category: CyberDefenseMagazine
By Zachary Folk, Director of Solutions Engineering, Camelot Secure The anticipated benefits of 5G’s faster speed, lower latency, and greater…
Data is arguably an organisation’s biggest asset, which makes it a key target for cybercriminals. With 26 per cent of…
By Nicole Allen, Senior Marketing Executive at Salt Communications Probably now more than ever, secure communications are crucial for Policing…
The underlying threat to organizations By Kunal Purohit, Chief Digital Services Officer, Tech Mahindra In Today’s world Cyber-attacks may be…
By Avishai Avivi, CISO, SafeBreach The face of cybersecurity is evolving. Cybercrime and its implications have grown into an inescapable…
Containerization has revolutionized the world of software development. By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research…
By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC…
By Jaye Tillson, Director of Strategy, Axis Security A question I get asked frequently is, “Will zero trust replace SD-WAN?”….
Abstract: The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties…
By Ben Smith, Field Chief Technology Officer, NetWitness Vulnerability is a four-letter word in the world of cybersecurity, as one…
Organizational Data Security Strategy – Bring Your Own Key (Byok) By Chris Allen, Senior Solutions Architect, Cryptomathic. Cloud computing is…
By Milica D. Djekic The Internet of Things (IoT) represents a collection of devices being capable to talk to each…