Category: CyberDefenseMagazine

Navigating the Uncertainties of CMMC 2.0: An Urgent Call for Clarity
06
Dec
2023

Navigating the Uncertainties of CMMC 2.0: An Urgent Call for Clarity

Unpacking the Complexities, Implications, and Future Outlook of the Cybersecurity Maturity Model Certification By David Brewer, Director of IT/Cybersecurity (Acting),…

Cybersecurity Awareness Month: The Overlooked Importance of API Security
05
Dec
2023

Distributed Applications & Security – Cybersecurity Magazine

The advent of Cloud providers in a big way impacts the way we are developing new applications since in most…

IT Modernization Efforts Need to Prioritize Cybersecurity
02
Dec
2023

IT Modernization Efforts Need to Prioritize Cybersecurity

By Mark Marron, CEO and President, ePlus, Inc. Organizations are increasingly advancing their digital transformation efforts to deliver internal efficiencies,…

01
Dec
2023

How to Avoid Common Security Incidents in the Public Cloud

By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the…

An Integrated Approach Is Essential for Combating Insider Threats — Here’s Why
30
Nov
2023

Why Harness the Full Potential of Zero-Trust Architecture to Secure OT Environments?

Zero-trust architecture is becoming popular because it is a more comprehensive cybersecurity framework than previous castle-and-moat models. Increasing internal threat…

From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies
30
Nov
2023

From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies

By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security…

4 Unexpected Ways AI Bias Can Jeopardize Cybersecurity
29
Nov
2023

ETSI Security Conference 2023: Dr. Claire Vishik and the Future of Cybersecurity

ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, took place face-to-face from 16 to 19 October 2023, in ETSI, Sophia Antipolis, France, and gathered more…

E-mail Compromise
29
Nov
2023

E-mail Compromise

How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of…

28
Nov
2023

IP network security in the age of DDoS and quantum computing

By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to…

Earthquakes, Cyber Breaches, and Mitigating Disasters through Design
28
Nov
2023

Earthquakes, Cyber Breaches, and Mitigating Disasters through Design

By Archie Agarwal, Founder and CEO of ThreatModeler The Great Earthquake of San Francisco in 1906 caused unbelievable levels of…

Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market
28
Nov
2023

Safeguarding Healthcare: A Closer Look at the Major Trends in the Health IT Security Market

The health IT security market is experiencing remarkable growth, driven by the pressing need for robust solutions that protect patient…

Fearful Festivities: How to stay cyber safe this festive season
27
Nov
2023

Fearful Festivities: How to stay cyber safe this festive season

With Christmas Day being mere weeks away, jingle bells and debit cards will be tapping and tinkling for this year’s Black Friday sales. While online shopping offers…