Category: CyberDefenseMagazine

Typical Cybersecurity Methods Aren’t Enough to Support the Modern Workforce
09
Feb
2023

Typical Cybersecurity Methods Aren’t Enough to Support the Modern Workforce

By Gee Rittenhouse, CEO, Skyhigh Security It’s time to adopt a zero-trust approach. Organizations in all sectors are adopting the…

Understand And Reduce The Sap Attack Surface
09
Feb
2023

Understand And Reduce The Sap Attack Surface

By Christoph Nagy, CEO & Co-Founder, SecurityBridge Knowing the attack surface in today’s world is very important to reduce the…

The Quantum Threat: Our Government Knows More Than You Do
07
Feb
2023

The Quantum Threat: Our Government Knows More Than You Do

By Skip Sanzeri, COO and Founder, QuSecure, Inc. Quantum computers are extremely powerful machines that utilize subatomic properties providing amazing…

A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks
06
Feb
2023

A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks

Abstract: In this day and age, Internet has become an innate part of our existence. This virtual platform brings people…

The Benefits of eBPF for API Security
05
Feb
2023

The Benefits of eBPF for API Security

By Sanjay Nagaraj, Co-Founder & CTO of Traceable AI You might hear the term “eBPF” mentioned when chatting to DevOps…

The Importance To Provide Buyers And Sellers Secure, Convenient, And Frictionless Payment Experiences
05
Feb
2023

The Importance To Provide Buyers And Sellers Secure, Convenient, And Frictionless Payment Experiences

By Héctor Guillermo Martínez, President GM Sectec The COVID-19 pandemic accelerated the adoption of digital payments globally and especially in…

The Psychology Behind Spear Phishing Scams
05
Feb
2023

The Psychology Behind Spear Phishing Scams

By Dr. Yvonne Bernard, CTO, Hornetsecurity Criminals are increasingly using fake emails to exploit their victims for financial gain and…

The ‘New Cold War’ Continues To Mark Urgency For Organisations To Bolster Cyber-Resilience
03
Feb
2023

The ‘New Cold War’ Continues To Mark Urgency For Organisations To Bolster Cyber-Resilience

By Dave Adamson, Chief Technology Officer at EspriaEncourages businesses to re-claim authority over their networks, thereby enhancing cyber-resilience in the…

NetFlow’s Dirty Little Secret
03
Feb
2023

NetFlow’s Dirty Little Secret – Cyber Defense Magazine

By Mark Evans, VP Marketing, Endace Many organizations assume their security tools can see everything that happens across the network…

Trusted Computing - An Introductory Overview
03
Feb
2023

Trusted Computing – An Introductory Overview

Firmware security risks One of the most neglected areas of cyber security is the firmware that underpins every device –…

Secure APIs to Drive Digital Business
01
Feb
2023

Secure APIs to Drive Digital Business

By Mourad Jaakou, General Manager Amplify at Axway Back in 2010, API Evangelist blogger Kin Lane posited that application programming…

Security in gaming: How to Recognize and Prevent Social Engineering Attacks in Gaming
01
Feb
2023

Security in gaming: How to Recognize and Prevent Social Engineering Attacks in Gaming

What is social engineering? By Jenna Greenspoon, Head of Parenting, Kidas As an avid internet user, it’s likely that at…