Category: CyberDefenseMagazine

Ensuring Container Security: Safeguarding the Future Of Cloud Computing
18
Oct
2023

Ensuring Container Security: Safeguarding the Future Of Cloud Computing

Containerization has revolutionized the world of software development. By Divakar Kolhe, Digital Marketer, Market Research Future (Part of Wantstats Research…

Passive Optical Networks: A Game Changer for Now And The Future
17
Oct
2023

Passive Optical Networks: A Game Changer for Now And The Future

By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused Consulting LLC…

Will Zero Trust Replace SD-WAN?
17
Oct
2023

Will Zero Trust Replace SD-WAN?

By Jaye Tillson, Director of Strategy, Axis Security A question I get asked frequently is, “Will zero trust replace SD-WAN?”….

LoRaWAN Security - Cybersecurity Magazine
17
Oct
2023

LoRaWAN Security – Cybersecurity Magazine

Abstract: The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties…

MOVEit’s Ransomware Attack Highlights the State of Cybersecurity
16
Oct
2023

MOVEit’s Ransomware Attack Highlights the State of Cybersecurity

By Ben Smith, Field Chief Technology Officer, NetWitness Vulnerability is a four-letter word in the world of cybersecurity, as one…

Securing the Cloud
16
Oct
2023

Securing the Cloud – Cyber Defense Magazine

Organizational Data Security Strategy – Bring Your Own Key (Byok) By Chris Allen, Senior Solutions Architect, Cryptomathic. Cloud computing is…

How Hacking of The Internet of Things Works In Practice
15
Oct
2023

How Hacking of The Internet of Things Works In Practice

By Milica D. Djekic The Internet of Things (IoT) represents a collection of devices being capable to talk to each…

Achieving Optimal Zero Trust Maturity: The Role of Data and Governance
15
Oct
2023

Achieving Optimal Zero Trust Maturity: The Role of Data and Governance

By Carolyn Duby, Chief Technology Officer, Cloudera Government Solutions The federal government has placed a stronger emphasis on zero trust…

Implementing a Modern, Holistic Approach to Tech Sector Security
14
Oct
2023

Implementing a Modern, Holistic Approach to Tech Sector Security

By Sean Malone, Chief Information Security Officer, Demandbase Technology has given rise to many comparisons in the past few years,…

Transformative Benefits of ML&AI in Cybersecurity
14
Oct
2023

Transformative Benefits of ML&AI in Cybersecurity

By Gizem Yılmaz, Product Owner, Nextray AI In the modern digital era, the significance of cyber security has escalated. With…

Policy: The Silent Sentinel of Your Cybersecurity Defenses
14
Oct
2023

Policy: The Silent Sentinel of Your Cybersecurity Defenses

By Craig Burland, CISO, Inversion6 Planning your next move to reinforce the organization’s cyber security posture? Take a moment to…

Bot Security: The Hunt for Vulnerabilities In The Digital Realm And The Burgeoning Need To Safeguard Users, Businesses, And Global Economies
14
Oct
2023

Bot Security: The Hunt for Vulnerabilities In The Digital Realm And The Burgeoning Need To Safeguard Users, Businesses, And Global Economies

By Mohit Shrivastava, ICT Chief Analyst, Future Market Insights Bots have incorporated themselves into our online experiences in the ever-expanding…