Category: CyberDefenseMagazine
How To Balance the Two Sources In cybersecurity, threat intelligence covers a broad range of activities concerning collection, analysis, and…
Navigating the Cybersecurity Landscape: Achieving Impactful Wins Through Data, Collaboration, and Continuous Improvement Do not think of advocating for critical…
The resurgence of banking trojans has become a major cybersecurity concern for financial institutions and their customers. These malicious backdoor…
In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered…
As the healthcare sector becomes increasingly digital, it faces a growing threat from cybersecurity attacks. Recent years have seen a…
I was thrilled to catch up with SquareX during Black Hat USA 2024. SquareX is a cybersecurity startup that specializes…
I was thrilled to catch up with Syxsense during Black Hat USA 2024. Syxsense is a cybersecurity company that provides…
With ransomware attacks reaching unprecedented levels, businesses face tough decisions when their data is held hostage. While the temptation to…
Today, ICT-related incidents remain rampant, with the scourge of data breaches showing no sign of abating. This year,millions of records will unfortunately once again be affected with the ramifications being severe and the average…
I was thrilled to catch up with F5 during Black Hat USA 2024. Years ago, when I started an innovative…
Fundamental and Foundational to InfoSec and Regulatory Compliance is Capturing all Packets. Figure 1. Endace High-Performance Packet-capture Appliance Endace specializes…
The concept of “defense in depth” dates back to ancient times, epitomized by the ramparts, draw-bridge, towers, and battlements surrounding…











