Category: CyberDefenseMagazine

5 Reasons Why a Sustainable Future RequiresCybersecurity
10
Apr
2024

Threat Intelligence Led Security Operations

The cybersecurity landscape is undergoing a rapid and relentless transformation. Traditional, reactive approaches are no longer sufficient to counter the…

Zero Trust Matures, Insider Threat Programs Take Off, and AI Doesn’t Change Things that Much Yet:  2024 Cybersecurity Predictions
10
Apr
2024

Zero Trust Matures, Insider Threat Programs Take Off, and AI Doesn’t Change Things that Much Yet: 2024 Cybersecurity Predictions

By Chris Scheels, VP of Product Marketing at Gurucul How will security analytics, machine learning/AI, and applied data science in…

Zero Trust: Navigating the Labyrinth of Laws in a Borderless Digital Age
10
Apr
2024

Zero Trust: Navigating the Labyrinth of Laws in a Borderless Digital Age

By Jaye Tillson, Director of Strategy & Field CTO, Axis Security The digital landscape, once akin to a fortified city…

Three Key Threats Fueling the Future of Cyber Attacks
09
Apr
2024

Three Key Threats Fueling the Future of Cyber Attacks

By Rishi Baviskar, Global Head of Cyber Risk Consulting at Allianz Commercial Improvements in cyber security and business continuity are…

The Role of Identity Data Management in Achieving CISA’S Strategic Goals
09
Apr
2024

The Role of Identity Data Management in Achieving CISA’S Strategic Goals

By Wade Ellery, Field Chief Technology Officer at Radiant Logic Cyber threats such as ransomware, zero-day exploits, phishing and supply…

The Quantum Shift
08
Apr
2024

The Quantum Shift – Cyber Defense Magazine

Preparing Cybersecurity for a New Era By Sercan Okur, VP of Technology, NextRay In contrast to my previous pieces, I…

Zero Trust Access: The Transformative Blueprint for Achieving Regulatory Compliance
08
Apr
2024

Zero Trust Access: The Transformative Blueprint for Achieving Regulatory Compliance

Ironclad compliance through the Zero Trust innovation mindset By Roy Kikuchi, Director of Strategic Alliances at Safous, Internet Initiative Japan…

The Pitfalls of Periodic Penetration Testing & What to Do Instead
08
Apr
2024

The Pitfalls of Periodic Penetration Testing & What to Do Instead

Periodic penetration testing approaches can be likened to regular tire inspections for vehicles. While they provide valuable insights into the…

The Case Study: The Exploitation of Mechatronics Systems
07
Apr
2024

The Case Study: The Exploitation of Mechatronics Systems

By Milica D. Djekic The mechatronics systems are a common part of the industrial control systems (ICS) or – in…

Strengthening Financial Services: Embracing the Digital Operational Resilience Act (DORA) for Cybersecurity Resilience
07
Apr
2024

Strengthening Financial Services: Embracing the Digital Operational Resilience Act (DORA) for Cybersecurity Resilience

By Boris Khazin, Head of Governance, Risk & Compliance at EPAM Systems, Inc. While concerns about market volatility, liquidity management…

Speaking Cyber-Truth: The CISO’s Critical Role in Influencing Reluctant Leadership
06
Apr
2024

Speaking Cyber-Truth: The CISO’s Critical Role in Influencing Reluctant Leadership

By Craig Burland, CISO, Inversion6 In the C-Suites and boardrooms of modern enterprises, there’s an unwelcome guest that often disrupts…

SASE and Zero Trust: A Powerful Combination
05
Apr
2024

SASE and Zero Trust: A Powerful Combination

By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Gone are the days when network security resembled a medieval castle. It…