Category: CyberDefenseMagazine

How to interpret the 2023 MITRE ATT&CK Evaluation results
20
Sep
2023

How to interpret the 2023 MITRE ATT&CK Evaluation results

Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization….

Publishers Spotlight: Omdia Research Risk-based Vulnerability Management Findings
19
Sep
2023

Publishers Spotlight: Omdia Research Risk-based Vulnerability Management Findings

Omdia research finds risk-based vulnerability management set to encompass the vulnerability management market by 2027 The first comparative research into…

Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs
19
Sep
2023

Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs

CyTwist has launched its Preemptive Cyber Attack Management Platform (PCAM) to enable defenders to expose attacks early and accurately while…

What to Consider When Choosing Cybersecurity Insurance Coverage
19
Sep
2023

What to Consider When Choosing Cybersecurity Insurance Coverage

By Richard Clarke, Chief Insurance Officer, Colonial Surety Company Despite the fact that marquee corporate names like Meta, T-Mobile, and…

TikTok Ban: The Death Knell for Free Access to the Web?
19
Sep
2023

TikTok Ban: The Death Knell for Free Access to the Web?

By Sebastian Schaub, CEO, hide.me Chinese tech company TikTok is firmly in the headlights as authorities in the US continue…

How Ai Can Be Used as A Tool to Help Monitor for Cybercrimes and Keep Kids Safe From Cyberbullying And Scams
19
Sep
2023

How Ai Can Be Used as A Tool to Help Monitor for Cybercrimes and Keep Kids Safe From Cyberbullying And Scams

By Ron Kerbs, CEO of Kidas Machine learning (ML) and classifiers have been used as cybersecurity tools for years. Starting…

Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection
18
Sep
2023

Publisher’s Spotlight: Dataminr: Real-time AI for Event and Risk Detection

Dataminr delivers the earliest warnings on high impact events, emerging risks, threats, and other critical information far in advance of…

Analyzing Four Diverse Attack Techniques Used by XeGroup
18
Sep
2023

Analyzing Four Diverse Attack Techniques Used by XeGroup

By Brett Raybould – EMEA Solutions Architect, Menlo Security XeGroup is a prime example of the untold damage that sophisticated…

Adaptive DDoS Attacks Get More Sophisticated: How to Beat Attackers’ New Ground Game 
18
Sep
2023

Adaptive DDoS Attacks Get More Sophisticated: How to Beat Attackers’ New Ground Game 

By Gary Sockrider, Director, Security Solutions, NETSCOUT The rapid expansion of Internet of Things (IoT) devices, which now number in…

IPv6 Security – Part 3
18
Sep
2023

Network Security Prediction and Situational Assessment Using Neural Network-based Method

Abstract: Technology development has promoted network construction, but malicious network attacks are still inevitable. To solve the problem that the…

Blockchain Technology: Strengthening Cybersecurity and Protecting Against Password Leaks and Data Breaches
18
Sep
2023

Blockchain Technology: Strengthening Cybersecurity and Protecting Against Password Leaks and Data Breaches

By Thomas Carter, CEO, True I/O In today’s digital landscape, the frequency and severity of password leaks and data breaches…

5 Reasons Why a Sustainable Future RequiresCybersecurity
15
Sep
2023

5 Reasons Why a Sustainable Future RequiresCybersecurity

Cities and industries are changing due to the convergence of environmental consciousness and technical advancement. The goal is to forge…