Category: CyberDefenseMagazine
By Megan Lupton, Senior Content Executive, Champions Speakers Sarah Armstrong-Smith is a globally revered voice in the cyberspace. She is…
By Sami Mäkiniemelä, Chief Security Officer, Miradore Last year, the U.S. saw a 57% increase in the number of cyberattacks…
Abstract: This paper is devoted to the investigation of the applicability of the Kolmogorov–Wiener filter to the prediction of heavy-tail…
By Chaim Mazal, Chief Security Officer, Gigamon Over the last few years, organizations have been hearing about a Zero Trust…
By Lorenzo Asuni, CMO, Ermes Cyber Security The Phishing phenomenon is growing exponentially, and unlike the most common forms of…
By Nicole Allen, Senior Marketing Executive at Salt Communications. The significance in having Secure Communications for Military Operations. Thanks to…
By Craig Burland, CISO, Inversion6 The Cloud’s booming voice, stunning light show and smoke fill the room. “Faster! More agile!…
Overview Unlike 4G, 5G goes beyond purely voice and faster data speed for consumer. Instead, 5G is also a major…
By Zac Amos, Features Editor, ReHack Cybersecurity Maturity Model Certification (CMMC) is another compliance framework defense industrial base (DIB) contractors…
By Peter Warmka, Founder, Counterintelligence Institute Over the past few years, Cybersecurity professionals have acknowledged the increasing need of security…
From Detecting Threats to Collecting Rich Signature Data — Sandboxes Help Malware Researchers Keep Defense Systems In Sync With An…
How to protect businesses from cyberattacks By Sergey Ozhegov, CEO, SearchInform Hacks and data leaks: how to protect businesses from…