Category: CyberDefenseMagazine

Cyber Risk Quantification: A New Way to Understand Security Risks
14
Jun
2023

Cyber Risk Quantification: A New Way to Understand Security Risks

CRQ can identify security improvements, prioritize implementation and justify security investments. Here’s how to make it work for your organization….

Evolution of the CISO Role
14
Jun
2023

Evolution of the CISO Role

By Jaye Tillson, Director of Strategy, Axis Security Evolution of the CISO Role The Chief Information Security Officer (CISO) role…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
12
Jun
2023

Image Hashing Robust Against Cropping and Rotation

Abstract: Image recognition is an important mechanism used in various scenarios. In the context of multimedia forensics, its most significant…

The Growing Necessity of Emphasizing Cloud Security in Business Operations
11
Jun
2023

The Growing Necessity of Emphasizing Cloud Security in Business Operations

Ensuring the protection and reliability of cloud security for business success By Deepak Gupta,CTO & Co-Founder of LoginRadius In today’s…

Third-Party Cyber Security Risk Management: Best Practices
11
Jun
2023

Third-Party Cyber Security Risk Management: Best Practices

By Sananda Dasgupta, Tech Industry and Cybersecurity Writer at Coloco Businesses are becoming increasingly reliant on third-party services for their…

Why It Will Take Sophisticated AI Solutions to Fight AI Security Attacks
11
Jun
2023

Why It Will Take Sophisticated AI Solutions to Fight AI Security Attacks

By Rom Hendler, CEO and Co-Founder of Trustifi We live in amazing times, when advanced AI-based text generating engines like…

1020 Cyber Security Professionals’ Actions and Experiences When Applying for A New Role.
11
Jun
2023

1020 Cyber Security Professionals’ Actions and Experiences When Applying for A New Role.

By Torquil Macleod, Founder and Director of Via Resource At Via Resource, we strive to provide a supportive service to…

Closing The Cyber Marketing Gap with Investors
11
Jun
2023

Closing The Cyber Marketing Gap with Investors

Positioning security as a stakeholder value proposition By Patrick Kehoe, Chief Marketing Officer at Coalfire With breaches and shutdowns making…

IPv6 Security features – Part 1
09
Jun
2023

IPv6 Security features – Part 1

This is the first article in a 3-part series, looking into the various security features that are part of the…

Stopping Criminals from Profiting Off Malware Requires a New Approach
07
Jun
2023

Stopping Criminals from Profiting Off Malware Requires a New Approach

By CW Walker, Director, Security Product Strategy at SpyCloud The first three quarters of 2022 saw the total detection of…

The Data Dilemma: Balancing Business Growth and Security
07
Jun
2023

The Data Dilemma: Balancing Business Growth and Security

By Noah Johnson, Co-Founder & CTO of Dasera In today’s digital age, data is the lifeblood of business growth. With…

Top 7 Tips to Protect Your Endpoint Devices
05
Jun
2023

Top 7 Tips to Protect Your Endpoint Devices

By Nicole Allen, Senior Marketing Executive at Salt Communications The threat landscape has become more sophisticated due to the new…