Category: CyberDefenseMagazine

Measuring the Effectivity of Security with Data Analysis
21
Aug
2023

Measuring the Effectivity of Security with Data Analysis

By Howie Robleza, Freelance Writer, Avigilon Effective security strategies are fundamental to the success of any business with both physical…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
21
Aug
2023

Analysis of Cyber Security Threats of the Printing Enterprise

Abstract: The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise,…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
21
Aug
2023

Analysis of Cyber Security Threats of the Printing Enterprise

Abstract: The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise,…

Publisher’s Spotlight: The Zero Day Initiative (ZDI):  Financially Rewarding InfoSec Researchers
20
Aug
2023

Publisher’s Spotlight: The Zero Day Initiative (ZDI): Financially Rewarding InfoSec Researchers

Formed by TrendMicro, the Zero Day Initiative (ZDI) was created to encourage the reporting of 0-day vulnerabilities privately to the…

Implement Machine Learning to Secure Your IoT Network
20
Aug
2023

Implement Machine Learning to Secure Your IoT Network

By Zac Amos, Features Editor, ReHack Connected devices pose unique security risks and are prone to bot attacks, requiring a…

Hybrid Mesh Firewall Management
20
Aug
2023

Hybrid Mesh Firewall Management – Cyber Defense Magazine

By Ulrica de Fort-Menares, VP of Product & Strategy, Indeni What is Hybrid Mesh Firewall? With the rise of hybrid…

How We Grew Revenue by Strengthening Cybersecurity
18
Aug
2023

How We Grew Revenue by Strengthening Cybersecurity

Make your security strategy good for business. By David Weisong, CIO at Energy Solutions Utility companies are, like just about…

Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection
18
Aug
2023

Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection

Did you know that only 4% of CISOs have real-time visibility into runtime vulnerabilities in containerized production environments (https://www.dynatrace.com/news/blog/runtime-vulnerability-management-still-vexing-organizations/)?  According…

Five Tips to Securing Your Organization Through Your People.
16
Aug
2023

Five Tips to Securing Your Organization Through Your People.

By Dr. Inka Karppinen, CPsychol. Lead Behavioural Scientist, CybSafe While many commentators continue to tout technological solutions to various cyber…

From Samsung to the Pentagon – Recent Stories Remind Us About the Importance of Sensitive Data Guardrails
16
Aug
2023

From Samsung to the Pentagon – Recent Stories Remind Us About the Importance of Sensitive Data Guardrails

By Thomas Segura, Cyber Security Expert, GitGuardian The last few weeks have been very challenging for data protection experts. In…

From Passwords to Passkeys – A Passing of the Torch
16
Aug
2023

From Passwords to Passkeys – A Passing of the Torch

The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those…

Ensuring Trust in Military Network Automation: Addressing Layer 8 Issues for Improved Operations and Security
14
Aug
2023

Ensuring Trust in Military Network Automation: Addressing Layer 8 Issues for Improved Operations and Security

By Marc Packler, President, CISO Advisory, Silent Quadrant and Tony Thomas, President & Chairman, Tony Thomas & Associates LLC Automation…