Category: CyberDefenseMagazine

An Integrated Approach Is Essential for Combating Insider Threats — Here’s Why
26
May
2023

An Integrated Approach Is Essential for Combating Insider Threats — Here’s Why

Insider threats are a growing phenomenon, but many businesses aren’t yet doing enough to protect themselves effectively. In Europe and…

Is Your Firm Ready for the SEC?
24
May
2023

Is Your Firm Ready for the SEC?

How To Prepare for the Regulations of Tomorrow By Jason Elmer, Founder and President of Drawbridge It is no secret…

How Must IT Leaders Develop Contingency Plans to Combat Geopolitical and Environmental Risks?
24
May
2023

How Must IT Leaders Develop Contingency Plans to Combat Geopolitical and Environmental Risks?

By Mohit Shrivastava, ICT Chief Analyst at Future Market Insights In today’s geostrategic context, geopolitics and technology are inextricably linked,…

How the Increasing IT Talent Gap is Impacting the Cybersecurity Industry
24
May
2023

How the Increasing IT Talent Gap is Impacting the Cybersecurity Industry

By Pete Sorensen, VP of Strategic Initiatives of ConnectWise In the rapidly evolving digital landscape, technology solution providers (TSPs) are…

Stop Backing Up Ransomware
22
May
2023

Stop Backing Up Ransomware – Cyber Defense Magazine

By James Gorman, Cyber Security Expert and Entrepreneur When utilizing cloud technology for workloads, companies often assume that their current…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
22
May
2023

Analysis of Network Security Countermeasures From the Perspective of Improved FS Algorithm and ICT Convergence

Abstract: In this paper, the forward selection (FS) algorithm is introduced on the basis of information and communication technology, and…

Understanding The Concept of Privacy By Design
20
May
2023

Understanding The Concept of Privacy By Design

By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and…

The Data Challenge: How to Map Data in A Distributed World
20
May
2023

The Data Challenge: How to Map Data in A Distributed World

By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies Here’s a quick-fire question: do you know where…

Why aren't more businesses adopting security standards?
19
May
2023

Why aren’t more businesses adopting security standards?

Baselining your security by adopting a standard such as Cyber Essentials, Cyber Essentials Plus or the ISO 27001 standard can…

Cyberattacks on City and Municipal Governments
18
May
2023

Cyberattacks on City and Municipal Governments

Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago.  The increase…

HIPAA-HITECH: Keeping the Compliance Engine Running on a Classic Data Protection Regulation
16
May
2023

HIPAA-HITECH: Keeping the Compliance Engine Running on a Classic Data Protection Regulation

By Gregory Hoffer, CEO, Coviant Software Everyone knows someone who is a vintage car nut. They keep their baby in…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
15
May
2023

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score

Abstract: Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical…