Category: CyberDefenseMagazine

Shifting The Focus: From Compliance to Secops In Supply Chain Security
06
Dec
2024

Shifting The Focus: From Compliance to Secops In Supply Chain Security

There are two main reasons why supply chain attacks are on the increase. First, there is a general trend of…

DSPM vs. CSPM: Understanding Modern Security Postures
03
Dec
2024

DSPM vs. CSPM: Understanding Modern Security Postures

Making sense of modern security postures can be challenging. In the past few years, the complexity of most IT environments…

The Importance of Data Anonymization In Safeguarding Sensitive Legal Information
01
Dec
2024

The Importance of Data Anonymization In Safeguarding Sensitive Legal Information

Several high-profile and global law firms have been under the radar of cyber-security data breaches. For instance, the Mossack Fonseca…

Can ChatGPT help someone with no coding skills build ransomware?
30
Nov
2024

Can ChatGPT help someone with no coding skills build ransomware?

There’s no doubt that generative AI is having a significant impact on the cyber security ecosystem, with software vendors, security teams, and…

The Last Stop: Protecting an NHL Franchise Against Cyberattacks
30
Nov
2024

The Last Stop: Protecting an NHL Franchise Against Cyberattacks

For the Seattle Kraken, the National Hockey League’s 32nd franchise, maintaining a strong defense off the ice—one that keeps cyber…

The Evolution of Cloud Strategy: Beyond “Cloud First”
29
Nov
2024

The Evolution of Cloud Strategy: Beyond “Cloud First”

In the rapidly evolving digital landscape, the mantra “Cloud First” is becoming a relic of the past. Today, organizations are…

Giving a Voice to Future Generations of Female Cybersecurity Leaders
29
Nov
2024

Giving a Voice to Future Generations of Female Cybersecurity Leaders

While most organizations today remain aware of the ongoing cybersecurity threats, there is a constant struggle to keep pace with…

Supply Chains Make Insider Threat Defense More Complex
27
Nov
2024

Supply Chains Make Insider Threat Defense More Complex

Regular insider threats are bad enough — conventional security tools don’t detect them, they know where it’ll hurt to hit,…

Securing AI Models – Risk and Best Practices
26
Nov
2024

Securing AI Models – Risk and Best Practices

Generative AI (Artificial Intelligence) has turned out to be a game changer after the introduction of ChatGPT, DALL-E, Bard, Gemini,…

Navigating the NIS2 Directive: A comprehensive guide for UK businesses
26
Nov
2024

Navigating the NIS2 Directive: A comprehensive guide for UK businesses

The tech regulatory landscape is constantly evolving, with the imminent Network and Information Security 2 Directive, more widely known as…

Innovator Spotlight: Sumo Logic
26
Nov
2024

Innovator Spotlight: Sumo Logic – Cyber Defense Magazine

The rapid adoption of cloud and digital services is driving exponential data growth, creating fragmented visibility and operational silos across…

Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations
25
Nov
2024

Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations

In today’s dynamic threat landscape, security leaders are under constant pressure to make informed choices about which solutions and strategies…