Category: CyberDefenseMagazine

The Next Generation of Endpoint Security Is Being Reimagined Today
13
May
2024

The Next Generation of Endpoint Security Is Being Reimagined Today

By Vivek Ramachandran, CEO & Founder, SquareX Gone are the days when traditional antivirus solutions were the bulwark of endpoint…

The Importance of Data Categorization In A Threat-Filled Landscape
13
May
2024

The Importance of Data Categorization In A Threat-Filled Landscape

By Dr. Pragyansmita Nayak, Chief Data Scientist, Hitachi Vantara Federal National security is amid a transformative journey driven by technological…

Spike in Layoffs Pose Serious Cybersecurity Concerns
11
May
2024

Spike in Layoffs Pose Serious Cybersecurity Concerns

Different Types of Risk Exposure and Best Practices for Protecting Your Data By Adam Gavish, CEO & Cofounder, DoControl There…

Red Sea Crisis and the Risk of Cyber Fallout
10
May
2024

Red Sea Crisis and the Risk of Cyber Fallout

By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction As Israel’s military campaign in Gaza continues, the United States as a…

Quishing Campaign Exploits Microsoft Open Redirect Vulnerability
09
May
2024

Quishing Campaign Exploits Microsoft Open Redirect Vulnerability

Diving into a new sophisticated campaign, exploiting Microsoft’s Open Redirect vulnerability through quishing By Elad Damari, Incident Response Group Manager,…

Overcoming Common Data Security Challenges
08
May
2024

Overcoming Common Data Security Challenges

By Claude Mandy, Chief Evangelist at Symmetry Systems Organizations depend on data to operate. From day-to-day operations to strategic decisions,…

Detect and Destroy Cyber Threats with Red Piranha
07
May
2024

Detect and Destroy Cyber Threats with Red Piranha

By Adam Bennett, CEO, Red Piranha Red Piranha is Australia’s leading cybersecurity technology and solutions developer, manufacturer, and official member…

Revolutionizing Cybersecurity Recruitment and Networking: The Cyberr.ai Approach
07
May
2024

Revolutionizing Cybersecurity Recruitment and Networking: The Cyberr.ai Approach

By Laurent Halimi, Founder, Cyberr In the wake of 4 million unfilled cybersecurity positions globally in 2023, conventional hiring practices…

What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform
06
May
2024

What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform

By Tom Tovar, Co-creator and CEO of Appdome There’s a major battle brewing between platform vs. platformization companies in cybersecurity….

Toby Bussa
06
May
2024

Strengthening Cyber Defense with Threat Intelligence Operations

By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more…

Organizational Cybersecurity Hinges on End-User Satisfaction
06
May
2024

Organizational Cybersecurity Hinges on End-User Satisfaction

The critical role end-user experience plays in organizational security By Amitabh Sinha, CEO and Co-Founder of Workspot In an era…

Celebrating our 12th Anniversary at RSA conference 2024
06
May
2024

Celebrating our 12th Anniversary at RSA conference 2024

It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with…