Category: CyberDefenseMagazine

Lead with simplicity: A guide for strengthening security in logistics
13
Aug
2024

Lead with simplicity: A guide for strengthening security in logistics

Supply chains are the pulse of our global economy. When they falter, the effects can ripple through industries — impacting…

From Cartels to Crypto: Trends Show Disruptive Cybercrime Evolving Rapidly
13
Aug
2024

From Cartels to Crypto: Trends Show Disruptive Cybercrime Evolving Rapidly

Cybercrime has expanded well beyond traditional practices like credit card theft and identity fraud. We are now witnessing the emergence of a…

publishers-spotlight-digitalxforce
13
Aug
2024

Publishers Spotlight: DigitalXForce – Cyber Defense Magazine

When I go to BlackHat I’m always looking for cyber innovation across many vectors including cyber resilience artificial intelligence and…

shedding-light-on-the-dark-web-enhancing-cybersecurity-through-proactive-monitoring
12
Aug
2024

Shedding Light on The Dark Web: Enhancing Cybersecurity Through Proactive Monitoring

In the digital age, the dark web has emerged as a clandestine marketplace for illicit activities, including the sale of stolen data, illegal software and various forms of malware. The proliferation of…

Maximizing Cybersecurity Impact Within Budget Constraints
11
Aug
2024

Maximizing Cybersecurity Impact Within Budget Constraints

Cybersecurity is the cornerstone of organizational stability and resilience today. Despite its critical importance, budgetary allocations often fall short due…

the-undeniable-but-often-overlooked-human-element-of-cybersecurity
10
Aug
2024

The Undeniable but Often Overlooked Human Element of Cybersecurity

It is firmly established that there is no such thing as 100% security – in fact, a security breach is not a…

transparency-in-cybersecurity-the-importance-of-accurate-vulnerability-disclosures
09
Aug
2024

Transparency in Cybersecurity: The Importance of Accurate Vulnerability Disclosures

Recently, the cybersecurity world has been rattled by a series of critical vulnerabilities discovered in Ivanti Connect Secure VPN software….

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter
07
Aug
2024

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter

I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My…

Getting the measure of ransomware – the vital role of tape technology
07
Aug
2024

Getting the measure of ransomware – the vital role of tape technology

The rapidly expanding global data storage market is being fuelled by a range of powerful tech trends. From the exponential…

whos-minding-the-store-why-operational-technology-security-has-become-a-top-priority-for-federal-security-leaders
05
Aug
2024

Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders

The Federal OT footprint – from military base operations to their public utilities, from postal operations to NASA missions –…

The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth
04
Aug
2024

The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth

Data security and consumer trust go hand-in-hand in our evolving digital world There’s no doubt that data is a catalyst…

it-is-time-for-smart-cyber-requirements-for-the-water-sector
03
Aug
2024

It Is Time for Smart Cyber Requirements for the Water Sector

Since 2021, the Biden Administration has been consistently talking about the limitations of a purely voluntary approach to cybersecurity for…