Category: CyberDefenseMagazine

Let’s Ease Up on the Cyber Criminal High Tech Hype
29
Sep
2023

Let’s Ease Up on the Cyber Criminal High Tech Hype

A recent article in Bleeping Computer detailed a new cyber attack technique developed by researchers in the UK that uses…

Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot
27
Sep
2023

Publisher’s Spotlight: Radiant Security: Your AI-powered SOC Co-pilot

Radiant Security helps you harness the power of AI in your SOC to boost analyst productivity, detect real attacks through…

Defending Beyond 9-to-5: BlackCloak
26
Sep
2023

Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’ Digital Sanctuaries

by Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine Overwhelming would be an understatement while walking through the 2023 BlackHat USA’s…

Why cyber risk is one of the top critical risks facing organisations today – and why it’s growing
25
Sep
2023

A Multi-Path Approach to Protect DNS Against DDoS Attacks

Abstract: Domain Name System (DNS) is considered a vital service for the internet and network operations, and practically this service is…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
25
Sep
2023

A Multi-Path Approach to Protect DNS Against DDoS Attacks

Abstract: Domain Name System (DNS) is considered a vital service for the internet and networks operations, and practically this service…

Six Tips to Ensure a Strong Patch Management Strategy
24
Sep
2023

Six Tips to Ensure a Strong Patch Management Strategy

By Ashley Leonard, CEO and Founder, Syxsense The proliferation of software applications and updates across the market today has put…

Cyber Attacks on Municipalities
23
Sep
2023

Cyber Attacks on Municipalities – Cyber Defense Magazine

What attracts cyber criminals to municipalities and how they can be prevented. By Veronika (Nikki) Jack, Student Majoring in Information…

Criminals are Bypassing Authentication with Stolen Session Cookies
23
Sep
2023

Criminals are Bypassing Authentication with Stolen Session Cookies

By Trevor Hilligoss, Director of Security Research, SpyCloud The last 12 months revealed a concerning trend in credential exposure. According…

Triple Tactics
23
Sep
2023

Triple Tactics – Cyber Defense Magazine

How APIs are being Targeted with Trinity Attacks By Andy Mills, VP EMEA, Cequence Security Application Programming Interfaces (APIs) are…

Three Ways to Protect the Data Powering Summer Vacations
23
Sep
2023

Three Ways to Protect the Data Powering Summer Vacations

By Amit Shaked, CEO and Co-Founder, Laminar The travel industry is in the midst of rapid recovery following the COVID-19…

Island Hopping in the Supply Chain – A Paradise for Cybercriminals
22
Sep
2023

Island Hopping in the Supply Chain – A Paradise for Cybercriminals

Cybercriminals are notoriously good at the art of uncovering the paths of least resistance that lead to an organisation’s valuable…

Publishers Spotlight: Nisos:  Your Managed Intelligence Partner
21
Sep
2023

Publishers Spotlight: Nisos: Your Managed Intelligence Partner

Nisos is the Managed Intelligence™ team you need to consider working with to solve your most complex security challenges. They…