Category: CyberDefenseMagazine

How Main Street Businesses Can Up Their Cybersecurity Game
02
Jun
2024

How Main Street Businesses Can Up Their Cybersecurity Game

By Mike Caralis, Vice President, Business Markets at Verizon Small businesses are not only essential in keeping Main Street thriving…

CTI for M&A
31
May
2024

CTI for M&A – Cyber Defense Magazine

Active dark web Intelligence to aid M&A  By Shawn Loveland, COO, Resecurity Every industry-leading company has gone through mergers and…

Is Zero Trust Enough?
31
May
2024

Is Zero Trust Enough? – Cyber Defense Magazine

Why Zero Access Is a Better Way To Protect Your Backup Infrastructure By Greg Tevis, Vice President of Strategy, Cobalt…

Cross-Team Collaboration is Vital for Organizations in Today’s Digital Landscape
30
May
2024

Cross-Team Collaboration is Vital for Organizations in Today’s Digital Landscape

By Tony King, SVP International at NETSCOUT In today’s world, where the digital landscape is rapidly evolving, the cyber threat…

Full Drive Encryption Only a Half-Measure for Data Security
30
May
2024

Full Drive Encryption Only a Half-Measure for Data Security

Pre-Boot Authentication Is the Missing Half By John Benkert, Cigent CEO and Co-founder In an era where data security breaches…

7 Social Media Phishing Scams to Watch Out For
29
May
2024

7 Social Media Phishing Scams to Watch Out For

Phishing attempts can come in the form of posts, direct messages (DMs) and advertisements, but how can you be sure?…

AI: Armageddon or auspicious new beginning? 
29
May
2024

AI: Armageddon or auspicious new beginning? 

The transformative capabilities of Generative AI have been compared to electricity and the internet but also the atom bomb by industry pundits, illustrating its power…

Three ways you can upgrade your cyber security to defend against phishing attacks
29
May
2024

Three ways you can upgrade your cyber security to defend against phishing attacks

Safeguarding against cyber attacks is paramount for protecting the integrity and security of your business. Phishing is a fraudulent attempt…

Adaptive Defense: Navigating the Complexities of AI-Powered Cybersecurity
29
May
2024

Adaptive Defense: Navigating the Complexities of AI-Powered Cybersecurity

Businesses today face an ever-evolving level of cyber threats, forcing organizations to face the increasingly difficult challenge of protecting vital…

Security and Privacy of Internet of Things: A Review of Challenges and Solutions
29
May
2024

Security and Privacy of Internet of Things: A Review of Challenges and Solutions

Abstract: The Internet of Things (IoT) is a global and comprehensive network that monitors and controls the physical world by…

AI, Deepfakes and Digital ID: The New Frontier of Corporate Cybersecurity
29
May
2024

AI, Deepfakes and Digital ID: The New Frontier of Corporate Cybersecurity

By Michael Marcotte, Founder & CEO of artius.iD The emergence of deepfakes fired the starting pistol in a cybersecurity arms…

Anti-Ransomware Day: How to Build a Strong Defence
29
May
2024

Anti-Ransomware Day: How to Build a Strong Defence

Falling on the seventh anniversary of the Wannacry ransomware attack, which affected more than 60 NHS trusts in the UK,…