Category: CyberDefenseMagazine

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
14
Jul
2023

Method of Increasing the Security of Smart Parking System

Abstract: Currently, the urgent task is developing the methods and tools for increasing Smart Parking software system security. The purpose…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
14
Jul
2023

Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime

Abstract: Wireless Sensor Network (WSN) is a group of small, intelligent sensors with limited resources. WSN has limited energy restrictions,…

An Interview with Greg Van Der Gaast
13
Jul
2023

An Interview with Greg Van Der Gaast

By Megan Lupton, Senior Content Executive, Champions Speakers From one of the most wanted hackers to being featured in the…

What are NIST Encryption Standards? Why Do They Matter a Lot?
13
Jul
2023

What are NIST Encryption Standards? Why Do They Matter a Lot?

By Amar Basic, Co-Founder CyberArrow Data encryption is essential in today’s technologically advanced world to safeguard sensitive information against hacker…

Empowered Encryption
11
Jul
2023

Empowered Encryption – Cyber Defense Magazine

Why organizations must take back control of their data By Dimitri Nemirovsky, Co-Founder & COO, Atakama Sometimes, what a change…

Most Commonly Overlooked Attack Surface Vulnerabilities & How to Fix Them
11
Jul
2023

Most Commonly Overlooked Attack Surface Vulnerabilities & How to Fix Them

By Marc Laliberte, Director of Security Operations at WatchGuard Over the last decade, many organizations have rapidly accelerated their digital…

Investing Wisely
09
Jul
2023

Investing Wisely – Cyber Defense Magazine

Where to focus spend during the economic downturn By Tim Wallen, Regional Director, UK, US & Emerging Markets, Logpoint There…

Online Privacy Statistics
09
Jul
2023

Online Privacy Statistics – Cyber Defense Magazine

By Milos Djordjevic, Online Privacy Expert, VPN Central Online privacy is a burning issue in our modern threat landscape. It…

The Power of Women in Cybersecurity: Promoting Gender Diversity for a Resilient Future
07
Jul
2023

The Power of Women in Cybersecurity: Promoting Gender Diversity for a Resilient Future

The field of cybersecurity is of paramount importance in today’s digital age, where threats to personal and organizational data continue…

Data Privacy and Data Protection: What Enterprises Need to Know
07
Jul
2023

Data Privacy and Data Protection: What Enterprises Need to Know

By Anurag Lal, President and CEO of NetSfere Digital transformation is exponentially increasing the amount of data companies collect, use…

Healthcare Under Siege
07
Jul
2023

Healthcare Under Siege – Cyber Defense Magazine

The Critical Threat of Cloud and IoMT Vulnerabilities By Ty Greenhalgh, Industry Principal, Healthcare, Claroty The healthcare sector is grappling…

Before You Deploy Advanced Tech, Consider the Hidden Cyberthreats
07
Jul
2023

Before You Deploy Advanced Tech, Consider the Hidden Cyberthreats

By Jennifer Varner, Director Security Solutions Sales – North America, Verizon Business Every year, emerging technologies come to market, offering…