Category: CyberDefenseMagazine
Containerization has revolutionized the world of software development. By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research…
By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC…
By Jaye Tillson, Director of Strategy, Axis Security A question I get asked frequently is, “Will zero trust replace SD-WAN?”….
Abstract: The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties…
By Ben Smith, Field Chief Technology Officer, NetWitness Vulnerability is a four-letter word in the world of cybersecurity, as one…
Organizational Data Security Strategy – Bring Your Own Key (Byok) By Chris Allen, Senior Solutions Architect, Cryptomathic. Cloud computing is…
By Milica D. Djekic The Internet of Things (IoT) represents a collection of devices being capable to talk to each…
By Carolyn Duby, Chief Technology Officer, Cloudera Government Solutions The federal government has placed a stronger emphasis on zero trust…
By Sean Malone, Chief Information Security Officer, Demandbase Technology has given rise to many comparisons in the past few years,…
By Gizem Yılmaz, Product Owner, Nextray AI In the modern digital era, the significance of cyber security has escalated. With…
By Craig Burland, CISO, Inversion6 Planning your next move to reinforce the organization’s cyber security posture? Take a moment to…
By Mohit Shrivastava, ICT Chief Analyst, Future Market Insights Bots have incorporated themselves into our online experiences in the ever-expanding…