Category: CyberDefenseMagazine

Publisher’s Spotlight: RegScale:  Holistically Manage Your Compliance Program
05
Sep
2023

Publisher’s Spotlight: RegScale: Holistically Manage Your Compliance Program

RegScale is a Modern GRC platform, delivering a simplified, integrated and scalable solution to meet the speed and real-time demands…

Publisher’s Spotlight: Security Journey:  Secure Coding Training for Developers and Everyone in the SDLC
05
Sep
2023

Publisher’s Spotlight: Security Journey: Secure Coding Training

Security Journey is a secure coding education provider that is focused on addressing the evolving landscape of cybersecurity threats with…

Publisher’s Spotlight: Security Journey:  Secure Coding Training for Developers and Everyone in the SDLC
05
Sep
2023

Publisher’s Spotlight: Security Journey: Secure Coding Training for Developers and Everyone in the SDLC

Security Journey is a secure coding education provider that is focused on addressing the evolving landscape of cybersecurity threats with…

Zero Trust Security: Pioneering Solutions on a ‘Never Trust, Always Verify’ Principle to Overcome Modern Cyberspace Security Challenges!
05
Sep
2023

Zero Trust Security: Pioneering Solutions on a ‘Never Trust, Always Verify’ Principle to Overcome Modern Cyberspace Security Challenges!

By Mohit Shrivastava, Chief Analyst ICT, Future Market Insights Zero trust security is a method of cybersecurity that undertakes that…

Why cyber risk is one of the top critical risks facing organisations today – and why it’s growing
04
Sep
2023

Why cyber risk is one of the top critical risks facing organisations today – and why it’s growing

With security breaches on the rise, cybersecurity has become a serious enterprise-wide risk management issue that needs to be strategically…

Why Cybersecurity for Private Equity Is Urgent Now – And What Funds Can Do to Move the Needle.
04
Sep
2023

Why Cybersecurity for Private Equity Is Urgent Now – And What Funds Can Do to Move the Needle.

Private equity fund-level technology leaders can play an impactful role in protecting their portfolio companies from cyber-attacks, from due diligence…

Why CISOs Should Prioritize Cloud Security and Access Management During Digital Transformation Initiatives
03
Sep
2023

Why CISOs Should Prioritize Cloud Security and Access Management During Digital Transformation Initiatives

By Ameya Khankar, Cybersecurity Consultant for Critical Infrastructure Companies undergoing digital transformation have decided to take the plunge into modernizing…

The Shodan as The Scariest Search Engine of Today
03
Sep
2023

The Shodan as The Scariest Search Engine of Today

By Milica D. Djekic According to many media’s releases – the Shodan is characterized as the scariest searching tool of…

Using Data Analysis to Identify Security Threats: An Overview
03
Sep
2023

Using Data Analysis to Identify Security Threats: An Overview

By Howie Robleza, Freelance Writer, Avigilon Security is an important component for the development of any business. However, hackers are…

The Intersection of OT and IT: Why Unified Cybersecurity is More Important than Ever.
03
Sep
2023

The Intersection of OT and IT: Why Unified Cybersecurity is More Important than Ever.

By Craig Burland, CISO, Inversion6 Computer-controlled devices are all around us.  From delivery robots to smart buildings to shipping and…

Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter
01
Sep
2023

Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter

Today’s cyber attackers are looking beyond network systems and devices to target organizations through digital platforms outside your perimeter. It’s…

The Other Russian War – What Can We Do?
01
Sep
2023

The Other Russian War – What Can We Do?

Russian hacking efforts have highlighted weaknesses in U.S. cybersecurity infrastructure. By Jamie Eiseman, George Washington University Russia is invading Ukraine,…