Category: CyberDefenseMagazine

Why Not Shut Off Access to The Internet Whenever a Password Is Saved
18
Dec
2023

Why Not Shut Off Access to The Internet Whenever a Password Is Saved

AND then never have to type a password again? By Irwin Gretczko, Founder & CEO, The Hack Blocker So, what…

The Corporate Transparency Act: Striking a Pact Between Fact & Privacy Impact
18
Dec
2023

The Corporate Transparency Act: Striking a Pact Between Fact & Privacy Impact

By Tom Aldrich, Chief Strategy Officer, 360 Privacy The Corporate Transparency Act (CTA) became law in the United States as…

AI in Cybersecurity
18
Dec
2023

AI in Cybersecurity

Separating Hype from Hyperbole By Avkash Kathiriya “Artificial Intelligence in cybersecurity is like a supercharged virtual fortress armed with a…

Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities
18
Dec
2023

Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities

By Julie Taylor, Tech Principal, Joyn Holdings LTD & Jacob Dahlman, Team Lead, Joyn Holdings LTD In an increasingly digital…

Why It’s More Important Than Ever to Align to The MITRE ATT&CK Framework
16
Dec
2023

Why It’s More Important Than Ever to Align to The MITRE ATT&CK Framework

By Michael Mumcuoglu, CEO & Co-Founder, CardinalOps As we approach the second half of a year punctuated by ransomware and…

Cybersecurity Is Changing: Is the Experience Positive or Negative?
16
Dec
2023

Cybersecurity Is Changing: Is the Experience Positive or Negative?

By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies Cybersecurity is Changing: Is the Experience Positive or Negative?…

Navigating The Cybersecurity Horizon: Insights and Takeaways from Blackhat2023
16
Dec
2023

Navigating The Cybersecurity Horizon: Insights and Takeaways from Blackhat2023

Exploring the Future of Cybersecurity at BlackHat 2023 By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine In our ever-evolving…

Understanding The Impact of The SEC’s Cybersecurity Disclosure Regulations
16
Dec
2023

Understanding The Impact of The SEC’s Cybersecurity Disclosure Regulations

By George Gerchow, CSO and SVP of IT, Sumo Logic Corporate security and compliance teams are scrambling to understand the…

Hidden in Plain Sight: Open-Source Software Vulnerabilities
14
Dec
2023

Hidden in Plain Sight: Open-Source Software Vulnerabilities

Open-source software (OSS), software which has had its original source code made available for redistribution and adaptation, has become so…

The Emergence of AI In the Enterprise: Know the Security Risks
14
Dec
2023

The Emergence of AI In the Enterprise: Know the Security Risks

By John Anthony Smith, CEO Conversant Group, and Eli Nussbaum, Managing Director, Conversant Group As businesses strive to keep up…

The Human Firewall: Strengthening the Weakest Link in Cybersecurity
14
Dec
2023

The Human Firewall: Strengthening the Weakest Link in Cybersecurity

By Steve Soukup, CEO, DefenseStorm Innovative technology has revolutionized the way we work and live by unlocking a wealth of…

The Rising Tide of Cybercrime as A Service (CaaS)
14
Dec
2023

The Rising Tide of Cybercrime as A Service (CaaS)

By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which,…