Category: CyberDefenseMagazine
By Howie Robleza, Freelance Writer, Avigilon Effective security strategies are fundamental to the success of any business with both physical…
Abstract: The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise,…
Abstract: The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise,…
Formed by TrendMicro, the Zero Day Initiative (ZDI) was created to encourage the reporting of 0-day vulnerabilities privately to the…
By Zac Amos, Features Editor, ReHack Connected devices pose unique security risks and are prone to bot attacks, requiring a…
By Ulrica de Fort-Menares, VP of Product & Strategy, Indeni What is Hybrid Mesh Firewall? With the rise of hybrid…
Make your security strategy good for business. By David Weisong, CIO at Energy Solutions Utility companies are, like just about…
Did you know that only 4% of CISOs have real-time visibility into runtime vulnerabilities in containerized production environments (https://www.dynatrace.com/news/blog/runtime-vulnerability-management-still-vexing-organizations/)? According…
By Dr. Inka Karppinen, CPsychol. Lead Behavioural Scientist, CybSafe While many commentators continue to tout technological solutions to various cyber…
By Thomas Segura, Cyber Security Expert, GitGuardian The last few weeks have been very challenging for data protection experts. In…
The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those…
By Marc Packler, President, CISO Advisory, Silent Quadrant and Tony Thomas, President & Chairman, Tony Thomas & Associates LLC Automation…