Category: CyberDefenseMagazine

Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure
18
Dec
2024

Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure

In an era where we are completely reliant on digital connectivity, the security of our critical infrastructure is paramount. CISA defines…

Innovator Spotlight: Fortra
17
Dec
2024

Innovator Spotlight: Fortra – Cyber Defense Magazine

by Dan K. Anderson CEO, CISO, and vCISO As cyber threats grow more sophisticated and frequent, organizations face immense pressure…

Protect SAP Supply Chains by Preventing Cyber Attacks
17
Dec
2024

Protect SAP Supply Chains by Preventing Cyber Attacks

Highly advanced and extremely dangerous cyberattacks are targeting SAP (from the company originally called “System Analysis Program” Development) software supply…

Breaking Up with Your Password: Why It’s Time to Move On
17
Dec
2024

Breaking Up with Your Password: Why It’s Time to Move On

Data breaches impacted more than 1 billion users in the first half of 2024, up 409% from this time last year, emphasizing the…

Big Faces, Big Spend, Low ROI: Why Ad Fraud is Increasingly Damaging Brands
16
Dec
2024

Big Faces, Big Spend, Low ROI: Why Ad Fraud is Increasingly Damaging Brands

Brands are increasingly seen to be employing familiar and expensive faces to ambassador ad campaigns and new products. However, with…

Beyond Encryption: Advancing Data-in-Use Protection
15
Dec
2024

Beyond Encryption: Advancing Data-in-Use Protection

In the ever-evolving landscape of cryptography, traditional encryption methods safeguarding data at rest and in transit remain foundational to cybersecurity…

Benefits of Network Monitoring Systems
14
Dec
2024

Benefits of Network Monitoring Systems

Maintaining a resilient, secure, and efficient network infrastructure is more important than ever. Network monitoring systems, which encompass both hardware…

Autonomous, Deterministic Security for Mission-Critical IOT Systems
13
Dec
2024

Autonomous, Deterministic Security for Mission-Critical IOT Systems

Mission-Critical Iot Systems: Cybersecurity Principles In creating an effective cybersecurity strategy for IoT systems, software architects examine obstacles that limit…

The Importance of Cybersecurity Hygiene
12
Dec
2024

The Importance of Cybersecurity Hygiene

Good cyber hygiene refers to the proactive steps and best practices users and organizations can take to keep their online…

The Unsolvable Problem: XZ and Modern Infrastructure
12
Dec
2024

The Unsolvable Problem: XZ and Modern Infrastructure

The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst…

A Cloud Reality Check for Federal Agencies
11
Dec
2024

A Cloud Reality Check for Federal Agencies

The move to cloud is not slowing down – spending by Federal civilian agencies on cloud computing could reach $8.3 billion in…

ETSI Security Conference 2024 – Post-Quantum Cryptography w/ Daniele Lacamera
10
Dec
2024

ETSI Security Conference 2024 – Post-Quantum Cryptography w/ Daniele Lacamera

Daniele Lacamera is a software technologist and researcher. He is an expert in operating systems and TCP/IP, with more than 20…