Category: CyberDefenseMagazine

Building A Secure Integrated Collaboration Platform
16
Nov
2023

Building A Secure Integrated Collaboration Platform

By Allen Drennan, Principal & Co-Founder, Cordoniq Integrated collaboration platforms improve and enhance the experiences of hybrid and remote employees….

Spotlight: Whitepaper: Information security for the medical device industry
16
Nov
2023

Spotlight: Whitepaper: Information security for the medical device industry

With a focus on the medical device industry, this paper provides software developers, hardware developers, and manufacturers with an understanding…

Delivering Safe Browsing Experiences in A Rising Tide of Web-Based Threats
16
Nov
2023

Delivering Safe Browsing Experiences in A Rising Tide of Web-Based Threats

By Brett Raybould, EMEA Solutions Architect, Menlo Security  According to Google, the average worker now spends three-quarters of their working…

Publishers Spotlight: The Syndicate Group (TSG)
16
Nov
2023

Publishers Spotlight: The Syndicate Group (TSG)

The Syndicate Group (TSG) is a leading venture firm focused on revenue growth and new customer acquisition. Leveraging an ecosystem…

Securing the Future of Data Security Through Transparency: A Glimpse into Quantum Random Number Generators Research & Development
16
Nov
2023

Securing the Future of Data Security Through Transparency: A Glimpse into Quantum Random Number Generators Research & Development

By Denis Mandich, Co-Founder and Chief Technology Officer of Qrypt Software supply chain security is a major concern in today’s…

Anything Is Hackable: Consumers Must Not Be Caught Out
16
Nov
2023

Anything Is Hackable: Consumers Must Not Be Caught Out

In an age driven by data, cyber-related crimes are on the rise. Business leaders must invest in new strategies designed…

There Are Cyberheroes:  THE VIGILANCE MANIFESTO
16
Nov
2023

There Are Cyberheroes: THE VIGILANCE MANIFESTO

A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI…

16
Nov
2023

How Can We Turn a Hacker’s Toolkit Against Them? The Evolution of a Phishing Email

By Jack Chapman, VP of Threat Intelligence, Egress Hackers use many tools at each stage of an attack and with…

16
Nov
2023

Who are the Wagner PMCs of Russia

Is There a Risk of Cyber Fallout? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Executive Summary At the end of…

User credentials are by far the best hack
14
Nov
2023

User credentials are by far the best hack

Losing sight of the biggest cause of security breaches isn’t surprising when there are often more column inches in the…

Protect your business from the inside out with zero-trust security
10
Nov
2023

Protect your business from the inside out with zero-trust security

Thinking your organisation is at less risk of a data breach is one of the biggest mistakes any business can…

Quantum Security is National Security
08
Nov
2023

Quantum Security is National Security

By Andy Manoske, Principal Product Manager of Cryptography and Security Products at HashiCorp Quantum computers will be one of the…