Category: CyberDefenseMagazine

Offensive Awakening: The 2024 Shift from Defensive to Proactive Security
05
May
2024

Offensive Awakening: The 2024 Shift from Defensive to Proactive Security

Adversarial Cyber Exercises Are The New Mandate By Stephen Gates, Principal SME, Horizon3.ai After observing the cyber threat landscape in…

Navigating the Digital Age: AI’s Crucial Role in Cybersecurity Reinforcement
05
May
2024

Navigating the Digital Age: AI’s Crucial Role in Cybersecurity Reinforcement

Harnessing the Power of AI for Advanced Cyber Threat Intelligence and Prevention By Bryan Kissinger, Senior Vice President of Security…

Navigating the API Security Landscape: A CEO’s Perspective on Embedding Zero Trust Principles
04
May
2024

Navigating the API Security Landscape: A CEO’s Perspective on Embedding Zero Trust Principles

By Jyoti Bansal, CEO and Co-Founder, Traceable AI In the dynamic world of digital transformation, I’ve observed a paradigm shift…

Identity Management Challenges
03
May
2024

Identity Management Challenges – Cyber Defense Magazine

By Milica D. Djekic There are a plenty of methods to determine someone’s identity and the most convenient cases are…

Hyperbole, Misinformation, and CyberMonsters Under the Bed
02
May
2024

Hyperbole, Misinformation, and CyberMonsters Under the Bed

By Ken Westin, Field CISO, Panther Labs This week at the World Economic Forum, there was a panel titled “Are…

How SaaS-Based Identity Governance Can Help Future-Proof Your Security
01
May
2024

How SaaS-Based Identity Governance Can Help Future-Proof Your Security

Evaluate your needs and prioritize solutions that offer open integration and independence from the single-vendor trend, ensuring robust IGA that…

Stop Managing Identities, Segment them Instead
30
Apr
2024

Stop Managing Identities, Segment them Instead

By Sagie Dulce, VP Research, Zero Networks A Brief History of Identity Management For as long as there have been…

Hacking and Cybersecurity
30
Apr
2024

Hacking and Cybersecurity – Cyber Defense Magazine

Trends to Look Out for in 2024 By Yashin Manraj, CEO, Pvotal Technologies For cybersecurity professionals, remaining effective requires staying…

Stop Managing Identities, Segment them Instead
29
Apr
2024

Stop Managing Identities, Segment them Instead

By Sagie Dulce, VP Research, Zero Networks A Brief History of Identity Management  For as long as there have been…

Good Security Is About Iteration, Not Perfection.
28
Apr
2024

Good Security Is About Iteration, Not Perfection.

By Craig Burland, CISO, Inversion6 In the dynamic and unpredictable realm of cybersecurity, striving for perfect solutions can be a…

GitGuardian Researchers Find Thousands of Leaked Secrets in PyPI (Python Package Index) Packages
27
Apr
2024

GitGuardian Researchers Find Thousands of Leaked Secrets in PyPI (Python Package Index) Packages

By Dwayne McDaniel, GitGuardian Developer and Security Advocate, GitGuardian The modern world of DevOps means relying on our code connecting…

Enhancing Cybersecurity Defenses: The role of Voice Cloning in Penetration Testing
26
Apr
2024

Enhancing Cybersecurity Defenses: The role of Voice Cloning in Penetration Testing

By Alex Serdiuk, CEO, Respeecher Newer and more impactful technological advancements are making the quest for foolproof cybersecurity measures more…