Category: CyberDefenseMagazine

the-undeniable-but-often-overlooked-human-element-of-cybersecurity
10
Aug
2024

The Undeniable but Often Overlooked Human Element of Cybersecurity

It is firmly established that there is no such thing as 100% security – in fact, a security breach is not a…

transparency-in-cybersecurity-the-importance-of-accurate-vulnerability-disclosures
09
Aug
2024

Transparency in Cybersecurity: The Importance of Accurate Vulnerability Disclosures

Recently, the cybersecurity world has been rattled by a series of critical vulnerabilities discovered in Ivanti Connect Secure VPN software….

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter
07
Aug
2024

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter

I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My…

Getting the measure of ransomware – the vital role of tape technology
07
Aug
2024

Getting the measure of ransomware – the vital role of tape technology

The rapidly expanding global data storage market is being fuelled by a range of powerful tech trends. From the exponential…

whos-minding-the-store-why-operational-technology-security-has-become-a-top-priority-for-federal-security-leaders
05
Aug
2024

Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders

The Federal OT footprint – from military base operations to their public utilities, from postal operations to NASA missions –…

The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth
04
Aug
2024

The Value of Trust: How Companies Can Harness Data Responsibly to Drive Growth

Data security and consumer trust go hand-in-hand in our evolving digital world There’s no doubt that data is a catalyst…

it-is-time-for-smart-cyber-requirements-for-the-water-sector
03
Aug
2024

It Is Time for Smart Cyber Requirements for the Water Sector

Since 2021, the Biden Administration has been consistently talking about the limitations of a purely voluntary approach to cybersecurity for…

Looking Past DevOps: AI, ClickOps and Platform Engineering
02
Aug
2024

Looking Past DevOps: AI, ClickOps and Platform Engineering

About fifteen years ago, DevOps radically overhauled the world of software engineering. Previously, the development process had been defined by…

The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare
01
Aug
2024

The Kaiser Data Breach Should Be a Wake-Up Call for Cybersecurity in Healthcare

In an alarming revelation, Kaiser Foundation Health Plan reported a data breach impacting over 13 million individuals. For years, there…

Analyzing the CrowdStrike Update Outage: Insights and Lessons from Maxine Holt on the Impact and Future of Cybersecurity Practices
31
Jul
2024

Analyzing the CrowdStrike Update Outage: Insights and Lessons from Maxine Holt on the Impact and Future of Cybersecurity Practices

On July 19, 2024, a critical update to CrowdStrike’s Falcon agent led to a significant global IT outage, affecting numerous…

How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert
31
Jul
2024

How to Best Secure Banking Applications – Top Tips from a Mobile Security Expert

It doesn’t take much to guess why cybercriminals increasingly target banking applications including emerging fintech and trading as their prime…

Mitigating Data Breaches with AI-Driven Security Solutions
29
Jul
2024

Mitigating Data Breaches with AI-Driven Security Solutions

SIEM & SOAR Solutions for Data Security Solutions Data breaches have become a significant threat to organizations of all sizes,…