Category: CyberDefenseMagazine

Internal And External Threat Intelligence
19
Aug
2024

Internal And External Threat Intelligence

How To Balance the Two Sources In cybersecurity, threat intelligence covers a broad range of activities concerning collection, analysis, and…

Getting Wins for Security Leaders: Strategies and Considerations for Success
18
Aug
2024

Getting Wins for Security Leaders: Strategies and Considerations for Success

Navigating the Cybersecurity Landscape: Achieving Impactful Wins Through Data, Collaboration, and Continuous Improvement Do not think of advocating for critical…

How To Respond to The Rise of Banking Trojans
17
Aug
2024

How To Respond to The Rise of Banking Trojans

The resurgence of banking trojans has become a major cybersecurity concern for financial institutions and their customers. These malicious backdoor…

Massive Data Breach at National Public Data Exposes 2.7 Billion Records
16
Aug
2024

Massive Data Breach at National Public Data Exposes 2.7 Billion Records

In a major cybersecurity incident, National Public Data, a company that specializes in collecting and aggregating public records, has suffered…

Addressing Cybersecurity Challenges in Healthcare: A Strategic Approach
16
Aug
2024

Addressing Cybersecurity Challenges in Healthcare: A Strategic Approach

As the healthcare sector becomes increasingly digital, it faces a growing threat from cybersecurity attacks. Recent years have seen a…

Publishers Spotlight: SquareX
16
Aug
2024

Publishers Spotlight: SquareX – Cyber Defense Magazine

I was thrilled to catch up with SquareX during Black Hat USA 2024. SquareX is a cybersecurity startup that specializes…

Publisher’s Spotlight: Syxsense
16
Aug
2024

Publisher’s Spotlight: Syxsense – Cyber Defense Magazine

I was thrilled to catch up with Syxsense during Black Hat USA 2024. Syxsense is a cybersecurity company that provides…

Choosing Security: Why Companies Should Reject Ransom Payments
15
Aug
2024

Choosing Security: Why Companies Should Reject Ransom Payments

With ransomware attacks reaching unprecedented levels, businesses face tough decisions when their data is held hostage. While the temptation to…

Time to explore the Digital Operational Resilience Act (DORA)
15
Aug
2024

Time to explore the Digital Operational Resilience Act (DORA)

Today, ICT-related incidents remain rampant, with the scourge of data breaches showing no sign of abating. This year,millions of records will unfortunately once again be affected with the ramifications being severe and the average…

Publishers Spotlight: F5
15
Aug
2024

Publishers Spotlight: F5 – Cyber Defense Magazine

I was thrilled to catch up with F5 during Black Hat USA 2024. Years ago, when I started an innovative…

Publishers Spotlight: Endace
14
Aug
2024

Publishers Spotlight: Endace – Cyber Defense Magazine

Fundamental and Foundational to InfoSec and Regulatory Compliance is Capturing all Packets. Figure 1.  Endace High-Performance Packet-capture Appliance Endace specializes…

Defense in Diversity: A Strategy for Robust Cybersecurity
14
Aug
2024

Defense in Diversity: A Strategy for Robust Cybersecurity

The concept of “defense in depth” dates back to ancient times, epitomized by the ramparts, draw-bridge, towers, and battlements surrounding…