Category: CyberDefenseMagazine

Bad Hygiene: New Study Uncovers Common Security Failures of Cloud-First Organizations
04
Aug
2023

Bad Hygiene: New Study Uncovers Common Security Failures of Cloud-First Organizations

By Ruoting Sun, Vice President of Products, Secureframe The rapid rise of cloud-first organizations has revolutionized the way businesses operate….

HEAT Attacks Vs Apts – What Is the Difference?
04
Aug
2023

HEAT Attacks Vs Apts – What Is the Difference?

By Mark Guntrip, Senior Director of Cybersecurity Strategy, Menlo Security A new breed of attacker has emerged, one that has…

7 Benefits of Implementing ZTNA
02
Aug
2023

7 Benefits of Implementing ZTNA

(Zero Trust Network Access) By Howie Robleza, Freelance Writer, Avigilon One of the most significant worries for business leaders in…

Biometric as a Service (BaaS) – An Opinion Piece
02
Aug
2023

Biometric as a Service (BaaS) – An Opinion Piece

By Mohit Shrivastava, Chief Analyst ICT, Future Market Insights Biometric as a service (BaaS) works best as a striking alternative…

Why Inadequate Investment in Cybersecurity is a False Economy
31
Jul
2023

Why Inadequate Investment in Cybersecurity is a False Economy

By Luke Dash, CEO, ISMS.online Already suffering the most cyberattacks than any other European country [RH1], the UK looks set…

The Power of AI In Today’s Rapidly Evolving Financial Crime Landscape
31
Jul
2023

The Power of AI In Today’s Rapidly Evolving Financial Crime Landscape

By Pedro Barata, Chief Product Officer, Feedzai Fraud has plagued the financial services sector for years. In today’s rapidly evolving…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
31
Jul
2023

Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems

Abstract: When creating signature-based cybersecurity systems for network intrusion detection (NIDS), spam filtering, protection against viruses, worms, etc., developers have…

What Can We Learn by Analyzing 197 Years of Cumulative Cybersecurity Testing?
29
Jul
2023

What Can We Learn by Analyzing 197 Years of Cumulative Cybersecurity Testing?

By Carolyn Crandall, Chief Security Advocate, Cymulate Each year, Cymulate releases a Cybersecurity Effectiveness Report that summarizes and analyzes the…

Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023
29
Jul
2023

Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023

By Sanjay Raja, VP of Product, Gurucul Dwell time, or the length of time a cyber attacker remains hidden within…

The Brick Wall of Identity Security: Five Parts for A Rock-Solid Defense
27
Jul
2023

The Brick Wall of Identity Security: Five Parts for A Rock-Solid Defense

By Raj Gopalakrishna, Co-Founder and Chief Product Architect, Acalvio Technologies The use of stolen credentials and resulting identity compromises have…

The Next Evolution of Devsecops For The Defense Department
27
Jul
2023

The Next Evolution of Devsecops For The Defense Department

By Jonas Lazo, Vice President of Digital Engineering, Sev1Tech The White House recently proposed an $842 billion budget for the…

Why Should Everyone in Your Workplace Know About Cybersecurity?
25
Jul
2023

Why Should Everyone in Your Workplace Know About Cybersecurity?

The Importance Of Strengthening Your Organization’s Human Firewall By Involving All Business Levels And Functional Areas. By Sara Velásquez, Growth…