Category: CyberDefenseMagazine

Considering All Returns on a Cybersecurity Compliance Program
05
Jun
2023

Considering All Returns on a Cybersecurity Compliance Program

By Doug Barbin, Chief Growth Officer and Managing Principal at Schellman C-Suite executives have many variables to consider when they…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
05
Jun
2023

A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations

Abstract: In the last two decades, the number of rapidly increasing cyber incidents (i.e., data theft and privacy breaches) shows…

Secure Enterprise Collaboration Tools Are Critical in Light of Remote Work and Cyber-Attacks.
05
Jun
2023

Secure Enterprise Collaboration Tools Are Critical in Light of Remote Work and Cyber-Attacks.

By Allen Drennan, Principal and Co-Founder of Cordoniq Cyberattacks escalated in 2022 as critical industries remain a frequent target of…

Risk: Everything Everywhere All at Once
03
Jun
2023

Risk: Everything Everywhere All at Once

It’s Time to Get Proactive About Risk Reduction By Marc Gaffan, CEO of IONIX The first quarter of 2023 is…

Video: Journal of Cyber Security and Mobility Best Paper 2022 with Roman Yampolskiy
02
Jun
2023

Video: Journal of Cyber Security and Mobility Best Paper 2022 with Roman Yampolskiy

River Publishers has announced the best paper of 2022 for the Journal of Cyber Security and Mobility, which was awarded…

Ransomware Takes No Prisoners
30
May
2023

Ransomware Takes No Prisoners – Cyber Defense Magazine

By Monica Oravcova, COO and Co-Founder of Naoris Protocol The recent Killnet cyberattack that disrupted contact between NATO and military…

Reduce Healthcare Insider Threats with Identity and Access Management
30
May
2023

Reduce Healthcare Insider Threats with Identity and Access Management

By Zac Amos, Features Editor of ReHack Identity and access management (IAM) refers to the policies, procedures and technologies used…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
29
May
2023

Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange

Abstract: A tropical encryption scheme is analyzed in this paper, which uses double key exchange protocol (KEP). The key exchange…

Leadership Is Still Washing Their Hands of Cyber Risk
28
May
2023

Leadership Is Still Washing Their Hands of Cyber Risk

By John A. Smith, CEO of Conversant Group Where it comes to owning responsibility for cyber risk, executive leadership has…

Machine Identity Management: The Key to Managing Compliance Risk in a Multi-Cloud, Multi-Cluster World
28
May
2023

Machine Identity Management: The Key to Managing Compliance Risk in a Multi-Cloud, Multi-Cluster World

By Sitaram Iyer, Senior Director of Cloud Native Solutions at Venafi Financial services may be an industry in which mainframes…

Protecting Accounting Firms from Cyberattacks
28
May
2023

Protecting Accounting Firms from Cyberattacks

Cybersecurity Practices Must Be A Top Priority For Firms This Busy Season By Alan Hartwell, Chief Technology Officer at IRIS…

New Cyber Threats Calls for New Approaches
26
May
2023

New Cyber Threats Calls for New Approaches

By Mark Sincevich, Federal Director of Illumio Data compromises hit record numbers in 2021 with 1,826 occurrences reported, up 23…