Category: CyberDefenseMagazine

Real Time Exposure Detection Is the Missing Element of Every Cybersecurity Strategy
01
Apr
2024

Real Time Exposure Detection Is the Missing Element of Every Cybersecurity Strategy

Detecting threats and vulnerabilities in real-time is crucial for an effective cybersecurity strategy to protect against cybercriminals. By Or Shoshani,…

QR Code Phishing Attacks: Threat Actors Are Now Shopping Online with You
01
Apr
2024

QR Code Phishing Attacks: Threat Actors Are Now Shopping Online with You

Olesia Klevchuk, Director of Email Protection at Barracuda, discusses the prevalence of QR code phishing attacks and how cybercriminals are…

Protecting Data in The Final Stretch of The Supply Chain
31
Mar
2024

Protecting Data in The Final Stretch of The Supply Chain

Building a Secure Last Mile for Global Commerce By Dan O’Toole, Chairman & CEO, Arrive Navigating the Last Mile: Securing…

Passwords In the Air
31
Mar
2024

Passwords In the Air – Cyber Defense Magazine

By Gautam Hazari, Chief Technology Officer, Sekura.id Imagine, you are sitting in a café, sipping the skillfully crafted coffee by…

Organizations Are Shifting Ransomware Defense Tactics, But Malware Is Still the Problem
30
Mar
2024

Organizations Are Shifting Ransomware Defense Tactics, But Malware Is Still the Problem

By Trevor Hilligoss, Senior Director of Security Research at SpyCloud Ransomware attacks are a fact of life – over 72% of global…

Open AI Exec Warns AI is “Extremely Addictive,” Humanity Could Become “Enslaved”
30
Mar
2024

Open AI Exec Warns AI is “Extremely Addictive,” Humanity Could Become “Enslaved”

By Sai Mattapalli and Rohan Kalahasty, Co-Founders — Vytal.ai The idea of technology going wrong and turning on its creators…

Manufacturing on the Cyber Frontlines: Enhancing Cybersecurity on the Factory Floor
29
Mar
2024

Manufacturing on the Cyber Frontlines: Enhancing Cybersecurity on the Factory Floor

By Berardino Baratta, CEO, MxD Manufacturing in the United States is changing. Today’s factory floors are a far cry from…

Making Our Infrastructure Resilient: 5 Priorities for Security R&D
29
Mar
2024

Making Our Infrastructure Resilient: 5 Priorities for Security R&D

By Saurabh Amin, Professor of Civil and Environmental Engineering PI, Laboratory for Information and Decision Systems Massachusetts Institute of Technology…

Key Differences in Securing OT & IT Environments
28
Mar
2024

Key Differences in Securing OT & IT Environments

Critical cybersecurity components every security leader must know amid the convergence of IT & OT By Joe O’Donnell, EVP of…

Institutionalizing Awareness to Stop Cyberattacks
28
Mar
2024

Institutionalizing Awareness to Stop Cyberattacks

By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology…

Implementing ZTA: Benefits and Best Practices
27
Mar
2024

Implementing ZTA: Benefits and Best Practices

By Eric Sugar, President, ProServeIT In an era defined by the relentless advance of digitalization and the ever-expanding interconnectivity of…

Attackers Keep Evolving: Lessons from Expel’s Q2 2023 Quarterly Threat Report
27
Mar
2024

Attackers Keep Evolving: Lessons from Expel’s Q2 2023 Quarterly Threat Report

Cyberdefenders plug the holes, so attackers innovate to try to stay ahead. By Aaron Walton, Threat Intel Analyst, Expel Most…