Category: CyberDefenseMagazine

Learning from the Inevitable
30
Sep
2025

Learning from the Inevitable – Cyber Defense Magazine

The talent shortage in cybersecurity continues to persist. Just last year, research showed a cybersecurity market gap of 85 workers for every…

Inside the Mind of a Threat Actor: What CISOs Must Learn Before the Next Breach
29
Sep
2025

Inside the Mind of a Threat Actor: What CISOs Must Learn Before the Next Breach

Cybersecurity isn’t a game of defense—it’s a game of anticipation. Yet too many CISOs and security leaders still think in…

Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation
29
Sep
2025

Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation

The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a…

AsyncRAT Malware Campaign Found Targeting South American Hotels
28
Sep
2025

AsyncRAT Malware Campaign Found Targeting South American Hotels

A new AsyncRAT malware campaign from threat actor TA558 is targeting the South American hospitality industry, demanding the attention of…

The Looming Authorization Crisis: Why Traditional IAM Fails Agentic AI
27
Sep
2025

The Looming Authorization Crisis: Why Traditional IAM Fails Agentic AI

In today’s enterprise world, AI no longer just answers questions or writes emails, but it takes action. From copilots booking…

Embracing the AI Revolution: How to Incorporate Generative AI into Your SOC 2 Compliance Plan
27
Sep
2025

Embracing the AI Revolution: How to Incorporate Generative AI into Your SOC 2 Compliance Plan

Generative AI (Gen AI) has emerged as a transformative force. From streamlining operations to enhancing customer experiences, AI-powered solutions offer…

From Defense to Offense: Why Ambitious CISOs Are Becoming Founders
26
Sep
2025

From Defense to Offense: Why Ambitious CISOs Are Becoming Founders

Once seen primarily as a technical gatekeeper, today’s chief information security officer (CISO) is a strategic leader responsible for safeguarding…

Customer Authentication Challenges That Impact Your Organization’s Security Posture
26
Sep
2025

Customer Authentication Challenges That Impact Your Organization’s Security Posture

Introduction In today’s cybersecurity landscape, CISOs face the challenge of securing data while managing costs effectively. As cyber threats become…

Print Friendly, PDF & Email
26
Sep
2025

The Real Cost of OT Cyber: Why Process-Level Security Is a Financial Decision

The threat of an OT cyber-attack isn’t just an operational risk. It’s also a financial one. Companies across critical infrastructure…

When Airports Go Dark: What The Weekend’s Cyber-attacks Tell Us About Business Risk
25
Sep
2025

When Airports Go Dark: What The Weekend’s Cyber-attacks Tell Us About Business Risk

Varun Uppal, founder and CEO of Shinobi Security Over the weekend, airports across Europe were thrown into chaos after a…

Choosing the Right C3PAO for Your CMMC Level 2 Certification
25
Sep
2025

Choosing the Right C3PAO for Your CMMC Level 2 Certification

If you’re aiming for CMMC Level 2 certification, choosing the right C3PAO (Certified Third-Party Assessment Organization) is one of the…

The Threat of Privilege Abuse in Active Directory
25
Sep
2025

The Threat of Privilege Abuse in Active Directory

In early 2024, the BlackCat ransomware attack against Change Healthcare caused massive disruption across the U.S. healthcare sector. It later…