Publisher’s Spotlight: Syxsense – Cyber Defense Magazine
I was thrilled to catch up with Syxsense during Black Hat USA 2024. Syxsense is a cybersecurity company that provides unified endpoint management and security…
I was thrilled to catch up with Syxsense during Black Hat USA 2024. Syxsense is a cybersecurity company that provides unified endpoint management and security…
With ransomware attacks reaching unprecedented levels, businesses face tough decisions when their data is held hostage. While the temptation to pay the ransom to recover…
Today, ICT-related incidents remain rampant, with the scourge of data breaches showing no sign of abating. This year,millions of records will unfortunately once again be affected with the ramifications being severe and the average breach now costing businesses around £3.5million. Facing these risks,…
I was thrilled to catch up with F5 during Black Hat USA 2024. Years ago, when I started an innovative e-commerce company, we used their…
Fundamental and Foundational to InfoSec and Regulatory Compliance is Capturing all Packets. Figure 1. Endace High-Performance Packet-capture Appliance Endace specializes in always-on, hybrid-cloud packet capture,…
The concept of “defense in depth” dates back to ancient times, epitomized by the ramparts, draw-bridge, towers, and battlements surrounding a medieval castle. Cybersecurity’s adaptation…
Supply chains are the pulse of our global economy. When they falter, the effects can ripple through industries — impacting production lines, delivery schedules, company…
Cybercrime has expanded well beyond traditional practices like credit card theft and identity fraud. We are now witnessing the emergence of a new era where sophisticated criminal…
When I go to BlackHat I’m always looking for cyber innovation across many vectors including cyber resilience artificial intelligence and most importantly compliance. This year…
In the digital age, the dark web has emerged as a clandestine marketplace for illicit activities, including the sale of stolen data, illegal software and various forms of malware. The proliferation of these marketplaces poses significant threats to…
Cybersecurity is the cornerstone of organizational stability and resilience today. Despite its critical importance, budgetary allocations often fall short due to competing priorities. Mimecast recently…
It is firmly established that there is no such thing as 100% security – in fact, a security breach is not a matter of ‘if’ but ‘when.’ In other words, risk…