Category: CyberDefenseMagazine

Embedding Privacy-First Behaviors for Future Generations
14
Aug
2023

Embedding Privacy-First Behaviors for Future Generations

By Michael Levit, Co-Founder and CEO of Tempest As all of our lives have moved online, the collection and sharing…

It's Time to Rethink MFA
13
Aug
2023

It’s Time to Rethink MFA

The UK government has launched new, stricter cyber security measures designed inresponse to the growth of ransomware attacks. These measures have been…

Don’t Jump to Conclusions on Zero Trust Adoption
12
Aug
2023

Don’t Jump to Conclusions on Zero Trust Adoption

By John Linford, Forum Director, The Open Group Security Forum, and Open Trusted Technology Forum The Open Group Security &…

Changing the Status Quo of Cloud Security
10
Aug
2023

Changing the Status Quo of Cloud Security

Skyhigh Security’s The Data Dilemma report underscores major paradigm shifts in cloud adoption and risk. By Rodman Ramezanian, Global Cloud…

How the SEC’s Proposed Security Rules Could Impact Businesses
10
Aug
2023

How the SEC’s Proposed Security Rules Could Impact Businesses

By Portia Cole, Emergent Threat Researcher, Avertium If the Security and Exchange Commission (SEC) has its way, it will soon…

Controlling Cybersecurity Risks
10
Aug
2023

Controlling Cybersecurity Risks – Cyber Defense Magazine

Controlling Cyber Risks and Fraud by Risk Assessment By Hakan Kantas, Senior IT Director We are trying to protect all…

What Will Cybersecurity Jobs Look Like in 2028?
10
Aug
2023

What Will Cybersecurity Jobs Look Like in 2028?

By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies What Will Cybersecurity Jobs Look Like in 2028? Macroeconomic…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
07
Aug
2023

System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security

Abstract: The complication of technological processes due to the modernization of complex technological processes aggregates with a distributed spatial infrastructure…

One Defense Against Data Breaches: Don’t Have the Data to Begin With
06
Aug
2023

One Defense Against Data Breaches: Don’t Have the Data to Begin With

By Raj Ananthanpillai, Founder and CEO, Trua When it comes to hackers stealing Social Security numbers and other personal identifiable…

Heard At RSAC 2023 – Protecting the Protectors
06
Aug
2023

Heard At RSAC 2023 – Protecting the Protectors

Some Personal Risks to Individual Cybersecurity Practitioners Are Elevated Because Of The Work They Do. Is It Time for Workplace…

Additional Detection of Clones Using Locally Sensitive Hashing
06
Aug
2023

Additional Detection of Clones Using Locally Sensitive Hashing

Abstract: Today, there are many methods for detecting blocks with repetitions and redundancy in the program code. But mostly they…

Why Cybersecurity Provision is Critical for Businesses, Large and Small
04
Aug
2023

Why Cybersecurity Provision is Critical for Businesses, Large and Small

By Astrid Gobardhan, Group Data Protection Officer at VFS Global, the world’s largest outsourcing and technology services specialist Against a…