Category: CyberDefenseMagazine

Top Recommendations for Data Retention and Deletion
20
Sep
2025

Top Recommendations for Data Retention and Deletion

The tremendous value that data holds for organizations also comes with the responsibility to properly address its storage, governance, and…

How the U.S. Can Strengthen Its Cyber Defenses Against Nation-State Threats
19
Sep
2025

How the U.S. Can Strengthen Its Cyber Defenses Against Nation-State Threats

The American power grid is not just the backbone of modern life. It’s a high-value target in our new era…

Beyond Tick Boxes: An Auditor’s Perspective on Information Security Compliance
19
Sep
2025

Beyond Tick Boxes: An Auditor’s Perspective on Information Security Compliance

Introduction As cyber threats evolve and regulatory requirements tighten, businesses face increasing pressure to protect their sensitive data and strengthen…

Why Outdated Corporate Networks Are Analogous to the Aging U.S. Highway System
18
Sep
2025

Why Outdated Corporate Networks Are Analogous to the Aging U.S. Highway System

“Necessity is the mother of invention” has never been more fitting—whether you’re talking about America’s post-WWII highway boom or the…

Mapping a Future without Cyber Attacks
18
Sep
2025

Mapping a Future without Cyber Attacks

After countless attacks across a multitude of organizations, the cyber security industry has a fairly good grasp of how adversaries…

Deepfakes at the Gate: How Fake Job Applicants Are Becoming a Serious Cyber Threat
17
Sep
2025

Deepfakes at the Gate: How Fake Job Applicants Are Becoming a Serious Cyber Threat

In recent months, the hiring process has become a new attack surface. Cybercriminals are no longer just spoofing emails or…

Protecting CISOs and CSOs in an Era of Personal Liability
17
Sep
2025

Protecting CISOs and CSOs in an Era of Personal Liability

Chief Information Security Officers (CISOs) and Chief Security Officers (CSOs) face unprecedented pressures, not only from the evolving threat landscape…

Innovator Spotlight: Black Kite
16
Sep
2025

Innovator Spotlight: Black Kite – Cyber Defense Magazine

The Invisible Threat: Reimagining Third-Party Risk Management Cybersecurity leaders are drowning in questionnaires while threat actors are swimming in data….

Expert Spotlight: Koushik Anand on IAM and PAM Excellence at Enterprise Scale
16
Sep
2025

Expert Spotlight: Koushik Anand on IAM and PAM Excellence at Enterprise Scale

By Gary Miliefsky, Publisher With more than 80% of breaches involving stolen or misused credentials, identity is the control point…

Innovator Spotlight: WitnessAI
16
Sep
2025

Innovator Spotlight: WitnessAI – Cyber Defense Magazine

WitnessAI Delivers Security for the AI Era In the AI era, innovation is moving fast. Unfortunately, this means that the…

Bridging the Cybersecurity Talent Gap
16
Sep
2025

Bridging the Cybersecurity Talent Gap

There’s no doubt about it. Cybersecurity incidents are rising. In 2024, the FBI reported a 9% increase in ransomware complaints targeting critical…

Innovator Spotlight: LastPass
16
Sep
2025

Innovator Spotlight: LastPass – Cyber Defense Magazine

LastPass Evolves Secure Access Experiences to Combat Shadow IT and AI Risks for CISOs Picture your organization humming along, with…